Advertisement

Efficient Remote User Authentication and Key Establishment for Multi-server Environment

  • Somanath Tripathy
  • Sukumar Nandi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4317)

Abstract

With the rapid development of communication technologies, resources are distributed over multiple servers in the network. These resources are usually restricted to authorized users. To provide access control and secure communication in the network, remote user authentication and key establishment is found to be most important. A Reversible Cellular Automata based remote user authentication and key establishment scheme using smart card is proposed in this paper. The scheme is simple, less computational and robust against various known attacks.

Keywords

Smart Card Authentication Scheme Mutual Authentication Replay Attack Authentication Phase 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. SRC research report 39 (1990)Google Scholar
  2. 2.
    Chan, C.K., Cheng, L.M.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 46(4), 992–993 (2000)CrossRefGoogle Scholar
  3. 3.
    Chang, C.C., Lee, J.: An efficient and secure multi-server password authentication scheme using smart cards. In: Proc of IEEE conf. CW 2004 (2004)Google Scholar
  4. 4.
    Fan, C., Chan, Y., Zhang, Z.: Robust remote authentication scheme with smart cards. Comp. & Sec. 24(8), 619–628 (2005)CrossRefGoogle Scholar
  5. 5.
    Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T., Schott, B.: Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 75–89. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 46(1), 28–30 (2000)CrossRefGoogle Scholar
  7. 7.
    Juang, W.S.: Efficient multi-server password authenticated key agreement using smart card. IEEE Trans. On Cons. Ele. 50(1), 251–255 (2004)CrossRefGoogle Scholar
  8. 8.
    Kai-Chi, L., Cheng, L.M., Fong, A.S., Chi-Kwong, C.: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 49(4), 1243–1245 (2003)CrossRefGoogle Scholar
  9. 9.
    Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 50(1), 204–207 (2004)CrossRefGoogle Scholar
  10. 10.
    Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. On Neural networks 12(6), 1498–1504 (2001)CrossRefGoogle Scholar
  11. 11.
    Lamport, L.: Password Authentication with Insecure Communication. Comm. of the ACM 24, 770–772 (1981)CrossRefGoogle Scholar
  12. 12.
    Lin, I.C., Hwang, M.S., Li, L.H.: A new remote user authentication scheme for multi-server architecture. Future Gen. Comp Sys 19, 13–22 (2003)MATHCrossRefGoogle Scholar
  13. 13.
    Pal Chaudhuri, P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications, vol. 1. Wiley-IEEE Computer Society Press (1997)Google Scholar
  14. 14.
    Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 49(2), 414–416 (2003)CrossRefGoogle Scholar
  15. 15.
    Stinson, D.R.: Cryptography Theory and Practice, 2nd edn. Chapman & Hall CRC Press (2002)Google Scholar
  16. 16.
    Tripathy, S., Chowdhuri, A.R., Nandi, S.: CARA: Cellualr Automata based Remote user authentication. In: Proc of COMSWARE-2006 (2006)Google Scholar
  17. 17.
    Yang, C.C., Yang, H.W., Wang, R.C.: Cryptanalysis of Security enhancement for the timestamp based password authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 50(2), 578–579 (2004)CrossRefGoogle Scholar
  18. 18.
    Wolfram, S.: A New kind of Science, Wolfram Media Inc. (2002)Google Scholar
  19. 19.
    Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)Google Scholar
  20. 20.
    Wu, T., Hsu, C.: Efficient user identification scheme with key distribution preserving anonymity for distributed computer network. Comp. & Sec. 23, 120–125 (2004)CrossRefGoogle Scholar
  21. 21.
    Yang, Y., Wang, S., Bao, F., Wang, J., Deng, R.: New efficient user identification and key distribution scheme providing enhanced security. Comp. & Sec. 23, 697–704 (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Somanath Tripathy
    • 1
  • Sukumar Nandi
    • 1
  1. 1.Indian Institute of Technology GuwahatiIndia

Personalised recommendations