Om et al., 2012 - Google Patents
RSA based remote password authentication using smart cardOm et al., 2012
- Document ID
- 12559334292802540636
- Author
- Om H
- Reddy M
- Publication year
- Publication venue
- Journal of Discrete Mathematical Sciences and Cryptography
External Links
Snippet
The smart-card based remote user authentication is one of the important practical solutions for creating a secure computer environment. In this paper, we propose a new remote password authentication technique using RSA public key cryptosystem. Our scheme does …
- 238000000034 method 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9571268B2 (en) | Method and system for homomorphicly randomizing an input | |
Hellman | An overview of public key cryptography | |
KR101098701B1 (en) | Use of isogenies for design of cryptosystems | |
KR101389100B1 (en) | A method and apparatus to provide authentication and privacy with low complexity devices | |
Tsaur et al. | A smart card-based remote scheme for password authentication in multi-server Internet services | |
US7000110B1 (en) | One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device | |
Wang et al. | A secure key agreement protocol based on chaotic maps | |
Tsaur | A flexible user authentication scheme for multi-server internet services | |
Lee et al. | Security analysis and modification of ID-based encryption with equality test from ACISP 2017 | |
Wu et al. | A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof | |
Fanfara et al. | Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication | |
Om et al. | RSA based remote password authentication using smart card | |
Kumar et al. | Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers | |
Om et al. | Comment and modification of RSA based remote password authentication using smart card | |
Geng et al. | A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings | |
Nandalal et al. | Design of programmable hardware security modules for enhancing blockchain based security framework | |
Andreevich et al. | On Using Mersenne Primes in Designing Cryptoschemes | |
Wang et al. | Using IC cards to remotely login passwords without verification tables | |
Harjito et al. | Comparative Analysis between Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic Certificate | |
JP3607191B2 (en) | Non-repudiation signature scheme based on secondary field | |
Saif et al. | AMathematicalProposed Model for Public Key Encryption Algorithm in Cybersecurity | |
Muhaya | Security analysis and improvement of a mutual authentication scheme under trusted computing | |
Chatterjee et al. | Timestamp based authentication protocol for smart card using ECC | |
Terrance et al. | In-depth Analysis of the Performance of RSA and ECC in Digital Signature Application | |
Reddy | Remote Password Authentication Using Linear Equations and Smart Card |