scispace - formally typeset
Search or ask a question
Book ChapterDOI

A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices

TL;DR: This paper proposes a new remote mutual authentication scheme in wireless environment without maintaining the password table based on ElGamal’s, which provides high security and mutual authentication at a reasonable computational cost.
Abstract: User authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops User authentication is a difficult for every system providing safe access to precious, private information, or personalized services User authentication is the primary line of defence for a handheld device that comes into the hands of an unauthorized individual Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users Remote mutual authentication is the best solution for remote accessing in Wi-Fi environment In this paper we propose a new remote mutual authentication scheme in wireless environment without maintaining the password table This is based on ElGamal’s It provides high security and mutual authentication at a reasonable computational cost Furthermore it restricts most of the current attacking mechanisms It is simple and can be adopted in any kind of lightweight devices
References
More filters
Journal ArticleDOI
Taher Elgamal1
23 Aug 1985
TL;DR: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields.
Abstract: A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem. The security of both systems relies on the difficulty of computing discrete logarithms over finite fields.

7,514 citations


"A New Remote Mutual Authentication ..." refers methods in this paper

  • ...Li [7]. Hwang–Li’s scheme is based on the ElGamal’s [ 2 ] public key scheme....

    [...]

Journal ArticleDOI
Leslie Lamport1
TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Abstract: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system. The method assumes a secure one-way encryption function and can be implemented with a microcomputer in the user's terminal.

2,874 citations

Journal ArticleDOI
TL;DR: This work proposes a new remote user authentication scheme using smart cards based on the ElGamal's (1985) public key cryptosystem that can withstand message replaying attack.
Abstract: We propose a new remote user authentication scheme using smart cards. The scheme is based on the ElGamal's (1985) public key cryptosystem. Our scheme does not require a system to maintain a password table for verifying the legitimacy of the login users. In addition, our scheme can withstand message replaying attack.

863 citations


"A New Remote Mutual Authentication ..." refers background or methods in this paper

  • ...Hwang Li’s [ 7 ] scheme, and suggested methods to repulse it. Awasthi–Lal [14] presented a remote user authentication scheme using smartcards with forward security....

    [...]

  • ...The proposed scheme also provides forward secrecy to the AS. Hwang Li [ 7 ] proposed a remote user authentication scheme....

    [...]

  • ...Li [ 7 ]. Hwang–Li’s scheme is based on the ElGamal’s [2] public key scheme....

    [...]

Journal ArticleDOI
TL;DR: This work provides mutual authentication between the user and the server and achieves more functionality and requires much less computational cost than other smart card-based schemes.

474 citations


"A New Remote Mutual Authentication ..." refers background or methods in this paper

  • ...Furthermore, Ku et al. [19] proposed an improvement to Chien [ 13 ]....

    [...]

  • ...Yoon et al. [23] citing Awasthi Lal [14] proposed a hash based authentication scheme based on the work of Chien et al.[ 13 ]....

    [...]

  • ...In addition, they showed that Chien [ 13 ] scheme is vulnerable and can be compromised....

    [...]

Journal ArticleDOI
01 May 1991
TL;DR: A remote password authentication scheme based on the Chinese remainder theorem is proposed that can verify the remote password without verification tables and provide a signature scheme and communication timestamps in the authentication phase against the potential attacks of replaying a previously intercepted login request.
Abstract: A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system verifies the remotely submitted password to check if the login request is accepted or rejected. A signature scheme and communication timestamps are provided in the authentication phase against the potential attacks of replaying a previously intercepted login request.

353 citations