Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card

نویسندگان

چکیده

Abstract With the rapid advancement and growth of computer networks, there have been greater demands for remote user password authentication protocols. In current ages, smartcard-based protocol has formed standard with their incredibly insubstantial, user-friendly equipment low-cost apps. this study, we proposed an effective robust using conformable chaotic map, where a calculus is branch newly appearing fractional calculus. It magnificent property, because it formulates controller term. We shall also offer formal proof smooth execution authenticated protocol. Our new more secure as compared to several comparable

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Smart Card Based Password Authentication Scheme with User Anonymity

Recently, a smart card based authentication and key agreement scheme preserving the user anonymity was proposed by Wang, Juang and Lei, that is designed to provide users with secure activities in ubiquitous computing environments. The authors proved that their scheme delivers important security properties and functionalities, such as without maintaining password/verification tables, freedom on ...

متن کامل

Cryptanalysis of Song's advanced smart card based password authentication protocol

Song [8] proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu, and Feng [9]. In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.

متن کامل

Efficient Two-Factor Authentication Protocol Using Password and Smart Card

Two-factor authentication using password and smart card could reduce the risk than the use of a password alone. Recently, Chen et al. proposed a two-factor remote user authentication protocol using password and smart card and provide the criteria of authentication protocols. They claimed their protocol is secure against certain known attacks. In this paper, the authors showed that Chen et al.’s...

متن کامل

An Improved Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement

Remote user authentication is a mechanism, in which the remote server verifies the legitimacy of a user over an insecure communication. Password authentication based on smart cards is one of the simplest and most efficient authentication methods and is a commonly deployed to authenticate the legitimacy of remote users. Based on cryptographic techniques, several password authentication schemes h...

متن کامل

Weaknesses of a Remote User Password Authentication Scheme Using Smart Card

Remote authentication is a method to authenticate remote users over insecure communication channel. Password-based authentication schemes have been widely deployed to verify the legitimacy of remote users. Very recently, Hsiang et al. pointed out that Yoon et al’s scheme is vulnerable to parallel session attack, masquerading attack and password guess attack. They proposed an improved scheme to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Complex & Intelligent Systems

سال: 2021

ISSN: ['2198-6053', '2199-4536']

DOI: https://doi.org/10.1007/s40747-021-00555-y