Proceedings ArticleDOI
Password based remote authentication scheme using ECC for smart card
Amutha Prabakar Muniyandi,Rajaram Ramasamy,Indrani +2 more
- pp 549-554
Reads0
Chats0
TLDR
This paper proposes a Password based authentication scheme using ECC for smart card environment, without maintaining the password table by the server, which provides high security at a reasonable computational cost and restricts most of the current attacking mechanisms.Abstract:
Remote user authentication is a continual problem, particularly with mobile and handheld devices such as Personal Digital Assistants (PDAs), Smartcard, Laptops. Providing user authentication for safe access of precious, private information, or personalized services, for every system is difficult User authentication is the primary line of defence for a handheld device that falls into the hands of an unauthorized individual. Password or Personal Identification Number (PIN) based authentication is the leading mechanism for verifying the identity of actual device users. Remote authentication is the best solution for remote accessing in smart card environment. In this paper we propose a Password based authentication scheme using ECC for smart card environment, without maintaining the password table by the server. It provides high security at a reasonable computational cost. Furthermore it restricts most of the current attacking mechanisms. It is simple and can be adopted in any kind of lightweight devices.read more
Citations
More filters
Journal Article
A Modified Remote User Authentication Scheme Using Smart Cards
TL;DR: A new remote user authentication scheme which is the modified form of the Shen-Lin-Hwang's scheme which can withstand attack that similar to Chan and Cheng's attack and Chang and Hwang' attack in registration phase and authentication phase is presented.
Journal ArticleDOI
Multilayer Consensus ECC-Based Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
TL;DR: This paper aims at providing a key agreement protocol for smart grid to cope with access control of appliances/ devices located inside a Home Area Network by a set of controllers outside the HAN with an Elliptic Curve Cryptography approach.
Further Cryptanalysis of password authentication schemes with smart cards
葉禾田,H.M. Sun.,Her-Tyan Yeh +2 more
Journal ArticleDOI
Robust and flexible tunnel management for secure private cloud
Yung-Feng Lu,Chin-Fu Kuo +1 more
TL;DR: A strong authentication with a key agreement scheme is proposed to establish the secure tunnel and the proposed framework also provides mutual authentication, session key renewal between the users and the cloud server.
References
More filters
Journal ArticleDOI
Remote password authentication with smart cards
Chin-Chen Chang,Tzong-Chen Wu +1 more
TL;DR: A remote password authentication scheme based on the Chinese remainder theorem is proposed that can verify the remote password without verification tables and provide a signature scheme and communication timestamps in the authentication phase against the potential attacks of replaying a previously intercepted login request.
Journal ArticleDOI
A remote password authentication scheme for multiserver architecture using neural networks
TL;DR: This work presents a remote password authentication scheme for multiserver environments that is a pattern classification system based on an artificial neural network that can withstand the replay attack.
Journal ArticleDOI
Refereed paper: Password authentication schemes with smart cards
Wen-Her Yang,Shiuh-Pyng Shieh +1 more
TL;DR: Two password authentication schemes with smart cards are proposed, in which users can change their passwords freely, and the remote system does not need the directory of passwords or verification tables to authenticate users.
Journal ArticleDOI
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
Wei-Chi Ku,Shuai-Min Chen +1 more
TL;DR: The weaknesses of Chien et al.'s scheme are shown, and an improved scheme with better security strength is proposed, which is vulnerable to a reflection attack and an insider attack.
Journal ArticleDOI
A modified remote user authentication scheme using smart cards
TL;DR: A different attack on Hwang-Li scheme is shown which is easier and simpler and an enhanced scheme for repairing the above attacks is presented.