[go: up one dir, main page]

Sood, 2011 - Google Patents

An improved and secure smart card-based authentication scheme

Sood, 2011

View PDF
Document ID
15664861404342939742
Author
Sood S
Publication year
Publication venue
International Journal of Multimedia Intelligence and Security

External Links

Snippet

Kim and Chung (2009) found that Yoon and Yoo's scheme (2005) easily reveals a user's password and is susceptible to masquerading user attack, masquerading server attack and stolen verifier attack. Therefore, Kim and Chung proposed a new remote user authentication …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
Sood et al. An improvement of Xu et al.'s authentication scheme using smart cards
Wang et al. Secure password-based remote user authentication scheme with non-tamper resistant smart cards
Jiang et al. An improved password-based remote user authentication protocol without smart cards
Sood An Improved and Secure Smart Card Based Dynamic Identity Authentication Protocol.
Karuppiah et al. Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards
Wang et al. Secure password-based remote user authentication scheme against smart card security breach
Ma et al. Cryptanalysis and improvement of Sood et al.’s dynamic ID-based authentication scheme
Leea et al. An S/Key-like one-time password authentication scheme using smart cards for smart meter
Tapiador et al. Cryptanalysis of Song's advanced smart card based password authentication protocol
Sood et al. An improvement of Liou et al.’s authentication scheme using smart cards
Lee et al. Improvement of the EIGamal based remote authentication scheme using smart cards
Sood et al. An improvement of Liao et al.'s authentication scheme using smart cards
Sood Dynamic identity based authentication protocol for two-server architecture
Srivastava et al. A review on remote user authentication schemes using smart cards
Sood et al. Secure dynamic identity-based remote user authentication scheme
Sood Advanced dynamic identity-based authentication protocol using smart card
Gao et al. Cryptanalysis of three dynamic ID-based remote user authentication schemes using smart cards
Sood An improved and secure smart card-based authentication scheme
Horng et al. A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards
Sudhakar et al. Secured mutual authentication between two entities
EP3361670B1 (en) Multi-ttp-based method and device for verifying validity of identity of entity
Chen et al. A secure YS-like user authentication scheme
Sharma et al. A robust multi-factor remote user authentication scheme for cloud-IoT services
Obeidat et al. An authentication model based on cryptography
Lee et al. Vulnerabilities in a remote agent authentication scheme using smart cards