Security Analysis and Performance Evaluation of an Enhanced Two-Factor Authenticated Scheme
نویسندگان
چکیده
Various security attacks may cause unauthorized access, misuse, modification, or denial of a computer network and network accessible resources. To prevent these attacks various authentication means can be used to provide authenticated key exchange protocols. Authenticated key exchange protocol allows the exchange of session key and also authenticates the identities of parties involved in the key exchange. It mathematically binds the agreed key to other agreed upon data such as shared secret keys, passwords and public/private key pairs. The reliability and security of the authentication protocol can be increased by combining two factors in the same authentication protocol. Many two-factor authenticated schemes have been proposed due to its usefulness. The main focus of this paper is to propose an enhanced two-factor authenticated scheme that can resist various security attacks in network by eliminating the attack races by matching it with knowledge available in the network as well as provide user anonymity.
منابع مشابه
A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کاملCPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملCryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks
In order to address the scenario in which the user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das proposed a two-factor authentication scheme. In 2010, Khan et al. pointed out that Das’s scheme has some security flaws and proposed an improved scheme. Recently, Yuan demonstrated that Khan et al.’s improvement is still insure against sever...
متن کاملAn Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof
With the development of technology, the security of password-based authentication is becoming more and more significant. Recently, Lee et al. proposed an anonymous password-based authenticated key agreement scheme with non-temper resistant smart card to reduce the computation cost of Wang et al.’s scheme. However, based on analysis, it shows that the scheme can’t withstand smart card stolen or ...
متن کامل