Improved ECC hybrid Encryption Scheme for Security Analysis of a Single Sign-On Mechanism in Distributed Computer Networks

نویسندگان

  • R. Arun Kumar
  • Viji Priya
چکیده

Single sign-on (SSO) is definitely an authentication mechanism that enables any legal user which has a one credential being authenticated by means of many distributed computer networks. Recently Chang and Lee proposed the latest SSO structure in addition to state their safety measures by providing well-organized safety measures quarrels. In another attack, an outsider without any credential might be able to enjoy network services freely by means of impersonating virtually any legal user or a nonexistent user. Most of us discover the actual weaknesses of their safety measure exactly why attacks are generally probable in opposition to their SSO structure. Our attacks also apply at a different SSO structure proposed by means of Hsu in addition to Chuang, which in turn influenced the planning from the Chang–Lee structure. In this proposed do the job many of us use Elliptic Challenge Cryptography (ECC) regarding higher efficiency together with small key dimensions a good choice for safety measures quarrels which has restricted strength. In the proposed system applying ECC the actual cryptographic procedures will be performed together with a lot fewer processor cycles operation can be carried out faster and providing well-organized security arguments in distributed computer network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Security Enhancement of Single Sign on Mechanism for Distributed Computer Networks

Single sign-on mechanisms allow users to sign on only once and have their identities automatically verified by each application or service they want to access afterwards. There are few practical and secure single sign-on models, even though it is of great importance to current distributed application environments. Most of current application architectures require the user to memorize and utiliz...

متن کامل

Single Sign on (sso) Mechanism Enhanced with Firewall Security in Multiple Service Provider

Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. To demonstrative that their scheme is actually insecure as it fails to meet credent...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014