[go: up one dir, main page]

Cheng et al., 2007 - Google Patents

Security enhancement of an IC-card-based remote login mechanism

Cheng et al., 2007

Document ID
2329588889181621097
Author
Cheng T
Lee J
Chang C
Publication year
Publication venue
Computer Networks

External Links

Snippet

Wang et al. presented a remote password authentication scheme using IC (Integrated Circuit) cards in 2004. Unfortunately, we discovered that their scheme is unable to withstand the forgery attack. We consequently propose in this paper a novel version to resist this kind …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
US20240007308A1 (en) Confidential authentication and provisioning
Wang et al. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Liao et al. A password authentication scheme over insecure networks
Shen et al. Security enhancement for the timestamp-based password authentication scheme using smart cards
CA2491049C (en) Method of preventing unauthorized distribution and use of electronic keys using a key seed
US20120144193A1 (en) Open protocol for authentication and key establishment with privacy
Awasthi et al. An improved timestamp-based remote user authentication scheme
US20060195402A1 (en) Secure data transmission using undiscoverable or black data
US20080240447A1 (en) System and method for user authentication with exposed and hidden keys
JP2001313634A (en) Method for communication
Chung et al. Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
Tsai et al. An ECC‐based blind signcryption scheme for multiple digital documents
JP2010231404A (en) Secret information management system, secret information management method, and secret information management program
Chen et al. A new method for using hash functions to solve remote user authentication
Shakiba Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks
Chang et al. A robust and efficient smart card based remote login mechanism for multi-server architecture
Amin et al. Design of an enhanced authentication protocol and its verification using AVISPA
Malina et al. Secure and efficient two-factor zero-knowledge authentication solution for access control systems
Chang et al. Novel untraceable authenticated key agreement protocol suitable for mobile communication
Cheng et al. Security enhancement of an IC-card-based remote login mechanism
EP3185504A1 (en) Security management system for securing a communication between a remote server and an electronic device
Gaskell et al. Integrating smart cards into authentication systems
Berta et al. Mitigating the untrusted terminal problem using conditional signatures
Srivastava et al. A review on remote user authentication schemes using smart cards
Wang et al. Using IC cards to remotely login passwords without verification tables