An Enhanced Remote Authentication Scheme using Secure Key Exchange Protocol with Platform Integrity Attestation
نویسندگان
چکیده
Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce are dependent on remote authentication schemes to validate user legitimacy in order to fulfill the authentication process. Unfortunately, these schemes are not able to provide trust or evidence of claimed platform identity. Therefore, these schemes are vulnerable to malicious software attacks that could compromise the integrity of the platform used for the communication. As a result, user identity or shared secret key potentially can be exposed. In this paper, we present a remote authentication scheme using secure key exchange protocol with hardware based attestation to resist malicious software attack. In addition, a pseudonym identity enhancement is integrated into the scheme in order to improve user identity privacy.
منابع مشابه
Extending TLS with Mutual Attestation for Platform Integrity Assurance
Normally, secure communication between client-server applications is established using secure channel technologies such as Transport Layer Security (TLS). TLS is cryptographic protocol which ensures secure transmission of data and authenticity of communication at each endpoint platform. However, the protocol does not provide any trustworthiness assurance of the involved endpoint. This paper inc...
متن کاملMutual Authentication Scheme with Smart Cards and Password under Trusted Computing
Only identities of the server and the user are authenticated in traditional smart cards based password authentication schemes, but the platform does not be verified, and which cannot provide enough protection on personal information of the user. A mutual authentication scheme based on smart cards and password is proposed under trusted computing, in which hash functions are used to authenticate ...
متن کاملUniversally Composable Secure TNC Protocol Based on IF-T Binding to TLS
Trusted Network Connect (TNC) requires both user authentication and integrity validation of an endpoint before it connects to the internet or accesses some web service. However, as the user authentication and integrity validation are usually done via independent protocols, TNC is vulnerable to the Man-in-the-Middle (MitM) attack. This paper analyzes TNC which uses keys with Subject Key Attestat...
متن کاملA Forward Secure Direct Anonymous Attestation Scheme
Direct Anonymous Attestation (DAA) is a cryptographic mechanism that enables remote authentication of a Trusted Platform Module (TPM) while preserving its privacy. In this paper, we propose a new DAA scheme based on the strong RSA assumption and the decisional Diffie-Hellman assumption. While satisfying all the security properties proposed in previous DAA schemes, our scheme provides a new desi...
متن کاملLightweight Remote Attestation using Physical Functions
Remote attestation is a mechanism to securely and verifiably obtain information about the state of a remote computing platform. However, resource-constrained embedded devices cannot afford the required trusted hardware components, while software attestation is generally vulnerable to network and collusion attacks. In this paper, we present a lightweight remote attestation scheme that links soft...
متن کامل