The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A typical Two-Party Authenticated Key Exchange Protocol aims to provide the information confidentiality between client and server in public network. The protocol has to satisfy some secure properties and possess the lower computational cost. The new protocol in this paper enhances the scheme of Chou, which has some flaws, such as the impersonation attack and public key problem. The enhanced scheme...
Cloud-based data storage is a popular cloud services. It can alleviate data management burden of data owner. However, after data file is transferred to the cloud, data owner is not able to physical dominate these outsourced data file. To efficiently ensure these data intact, several ReD-based integrity checking schemes were presented to ensure data integrity. Due to periodical checking, many data...
MySQL database identity authentication uses a CHAP protocol, that is, the challenge/response protocol, which exists the password expressly transmission, one-way authentication, random time can not grasp and other security issues. In this paper, we analyze the security problems of the existing MySQL database authentication protocol, and propose a new type MySQL integrated mutual authentication security...
As the dependency on Internet is increasing, the service providers are launching numerous web applications to facilitate the users. Due to threat of unauthorized access they want to identify their users accurately. In the same way, leakage of sensitive information makes clients aware enough to make sure whom they are dealing with. This leads to the requirement of a Centralized Authentication System(CAS)...
Password Authenticated Key Exchange (PAKE) protocols permit two entities to generate a large common session key and authenticate each other based on a pre-shared human memorable password. In 2006, Strangio proposed the DH-BPAKE protocol and claimed that the mentioned protocol is provably secure against several attacks. In this paper, it is shown that the DH-BPAKE protocol is vulnerable to password...
The two-factor authentication scheme combined password with smart card is one of the most widely used methods. This paper analyzes the security performance of a latest proposed remote user authentication scheme and simulates the attacks it suffers: it's vulnerability to the password guessing attack, the server masquerade attack and lacks of password backward security. Based on the detailed security...
Bilinear pairings in cryptography have been found to be very useful for various applications recently. In 2006, Das et al. proposed a novel ID-based remote user authentication scheme using bilinear pairings. The ID-based public-key cryptosystem (ID-based PKC) with bilinear pairings defined on elliptic curve can achieve simplifying the certificate management. However, Das et al.'s scheme cannot provide...
This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos...
Achieving trust relationship with privacy preservation is one of the key purposes of identity management. A novel identity management model is proposed to build trust relationship among different parties through identity validation and authentication. A two-way handshake process with two variants is introduced to implement strong mutual authentication between users and service providers without revealing...
Typical protocols for password-based authentication assumes a single server which stores all the passwords necessary to authenticate users. If the server is compromised, user passwords are disclosed. To address this issue, Yang et al. proposed a practical password-based two-server authentication and key exchange protocol, where a front-end server, keeping one share of a password, and a back-end server,...
Nowadays, email has become the most widely communication way in daily life. Recently, to improve security and efficiency of email system, Kwon et al. proposed a forward-secure password-based email protocol. Unfortunately, by analyzing the security of the scheme, we show that their protocol cannot resist to the forged message attack of the sender server, that is to say, the sender server can disguise...
Three-party authenticated key exchange protocol (3PAKE) is an important cryptographic technique for secure communication which allows two parties to agree a new secure session key with the help of a trusted server. In this paper, we proposed a new three-party authenticated key exchange protocol which aims to achieve more efficiency with the same security level of other existing 3PAKE protocols. Security...
A scalable authentication protocol is proposed for security and efficient RFID communication. The performance evaluation and security analysis has proved its advantages. Compared with other protocols, it can preserve content and location privacy, resist replay attacks and Dos attacks, and has forward security and scalable.
Authentication is the basic security service in an open and vulnerable communications network such as the Internet. Unilateral authentication is vulnerable to the Man-in-the-Middle (MitM) attack. The security of mutual authentication against MitM attack is also weak. As case studies, we discuss the security of the well-known mutual authentication protocol-Secure Sockets Layer (SSL) protocol, examine...
Some new notions and approaches are introduced to SVO logic, which make it capable of analyzing some authenticated key agreement protocols. A typical wireless authentication and key agreement protocol based on elliptic curve cryptography is analyzed by formal analysis methods. Some flaws have been found, which means that the protocol can not achieve the essential security requirements of security...
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remote server. However, some weaknesses of the two bilinear pairing based remote password authentication schemes are found in the paper. The schemes suffer from offline password guessing attack...
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
As IT systems proliferate to support business processes, users and system administrators are faced with an increasingly complicated interface to accomplish their job functions, some uniform identity authentication systems are developed to integrate different application systems in recent years. However, most of them only can integrate C/S systems. Thus, a new uniform identity authentication system...
Recently, Rhee, Kwon and Lee proposed a practical authentication scheme only based on the common storage device. In the scheme the remote user does not need to use smart cards. It is convenient for the users to use a common storage device such as a universal serial bus memory. The scheme is easy to implement. However, this authentication scheme is vulnerable to impersonation attacks and middle man...
In this paper, we propose SEAS, a novel privacy preserving, anonymous authentication scheme for RFID tags, which allows the tags to use pseudonyms instead of their true identity for authentication. Using SEAS, a tag generates random numbers and uses them to create a pseudonym as its identity for authentication. The pseudonym does not reveal the identity of the tag and the pseudonyms of multiple authentications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.