Dynamic Encryption Key based Smart Card Authentication Scheme

نویسندگان

  • Ravi Singh Pippal
  • Pradeep Gupta
  • Rakesh Singh
چکیده

In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart card authentication scheme using symmetric key cryptography, which covers all the identified security pitfalls and satisfies the needs of a user. Its security is based on encrypting the contents of all the communicating messages exchanged between remote user and the server. Moreover, it provides users to choose and change their passwords freely, mutual authentication and session key generation. In addition, it uses nonce instead of timestamp to resist replay attack. Security analysis proves that this scheme is secure against impersonation attack, password guessing attack, replay attack, reflection attack, parallel session attack, insider attack, attack on perfect forward secrecy, stolen verifier attack, smart card loss attack and man-in-the-middle attack. The proposed scheme can be easily extended to Internet protocol television broadcasting, Multi-server authentication, Wireless communication and Healthcare, where the user needs to access data from server.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Smart Card Authentication Scheme using Image Encryption

From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using image encryption that resists all the possible attacks and satisfies the needs of a user. Its securi...

متن کامل

Secure Key Exchange Scheme for IPTV Broadcasting

In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to descramble the scrambled program. This paper presents a secure...

متن کامل

Improvement of smart card based password authentication scheme for multiserver environments

In multiserver (MS) environments, it is preferable for a remote user to login to different service provider servers by keying in the same password. Recently, Wang et al. proposed an improvement on the dynamic identity-based smart card authentication scheme of Liao and Wang for MS environments. Sandeep et al. improved the dynamic identity-based smart card authentication scheme of Hsiang et al. f...

متن کامل

A Robust Password-based Authentication Scheme for Heterogeneous Sensor Networks

Abstract User authentication is a critical security function for computer systems that allow legitimate users remote access over an insecure communication network. In this paper, we propose a new password-based authentication scheme for heterogeneous sensor networks that consist of sensor nodes of different types. The proposed scheme allows legitimate users to query sensor data at any sensor no...

متن کامل

An improved dynamic ID-based remote user authentication with key agreement scheme

In 2011, Lee et al. improved Hsiang et al.'s scheme and proposed a security dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. They claimed that their protocol is efficient and can resist several kinds of known attacks. However, we observe that Lee et al.'s scheme is still vulnerable to stolen smart card attack, malicious server attack. To remedy ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013