[go: up one dir, main page]

Om et al., 2012 - Google Patents

RSA based remote password authentication using smart card

Om et al., 2012

Document ID
12559334292802540636
Author
Om H
Reddy M
Publication year
Publication venue
Journal of Discrete Mathematical Sciences and Cryptography

External Links

Snippet

The smart-card based remote user authentication is one of the important practical solutions for creating a secure computer environment. In this paper, we propose a new remote password authentication technique using RSA public key cryptosystem. Our scheme does …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols

Similar Documents

Publication Publication Date Title
US9571268B2 (en) Method and system for homomorphicly randomizing an input
Hellman An overview of public key cryptography
KR101098701B1 (en) Use of isogenies for design of cryptosystems
KR101389100B1 (en) A method and apparatus to provide authentication and privacy with low complexity devices
Tsaur et al. A smart card-based remote scheme for password authentication in multi-server Internet services
US7000110B1 (en) One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device
Wang et al. A secure key agreement protocol based on chaotic maps
Tsaur A flexible user authentication scheme for multi-server internet services
Lee et al. Security analysis and modification of ID-based encryption with equality test from ACISP 2017
Wu et al. A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
Fanfara et al. Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication
Om et al. RSA based remote password authentication using smart card
Kumar et al. Cryptanalysis and performance evaluation of enhanced threshold proxy signature scheme based on RSA for known signers
Om et al. Comment and modification of RSA based remote password authentication using smart card
Geng et al. A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings
Nandalal et al. Design of programmable hardware security modules for enhancing blockchain based security framework
Andreevich et al. On Using Mersenne Primes in Designing Cryptoschemes
Wang et al. Using IC cards to remotely login passwords without verification tables
Harjito et al. Comparative Analysis between Elgamal and NTRU Algorithms and their implementation of Digital Signature for Electronic Certificate
JP3607191B2 (en) Non-repudiation signature scheme based on secondary field
Saif et al. AMathematicalProposed Model for Public Key Encryption Algorithm in Cybersecurity
Muhaya Security analysis and improvement of a mutual authentication scheme under trusted computing
Chatterjee et al. Timestamp based authentication protocol for smart card using ECC
Terrance et al. In-depth Analysis of the Performance of RSA and ECC in Digital Signature Application
Reddy Remote Password Authentication Using Linear Equations and Smart Card