TY - JOUR
T1 - A secure and enhanced elliptic curve cryptography-based dynamic authentication scheme using smart card
AU - Madhusudhan, R.
AU - Hegde, Manjunath
AU - Memon, Imran
N1 - Publisher Copyright:
Copyright © 2018 John Wiley & Sons, Ltd.
PY - 2018/7/25
Y1 - 2018/7/25
N2 - In remote system security, 2-factor authentication is one of the security approaches and provides fundamental protection to the system. Recently, numerous 2-factor authentication schemes are proposed. In 2014, Troung et al proposed an enhanced dynamic authentication scheme using smart card mainly to provide anonymity, secure mutual authentication, and session key security. By the analysis of Troung et al's scheme, we observed that Troung et al' s scheme does not provide user anonymity, perfect forward secrecy, server's secret key security and does not allow the user to choose his/her password. We also identified that Troung et al's scheme is vulnerable to replay attack. To fix these security weaknesses, a robust authentication scheme is proposed and analyzed using the formal verification tool for measuring the robustness. From the observation of computational efficiency of the proposed scheme, we conclude that the scheme is more secure and easy to implement practically.
AB - In remote system security, 2-factor authentication is one of the security approaches and provides fundamental protection to the system. Recently, numerous 2-factor authentication schemes are proposed. In 2014, Troung et al proposed an enhanced dynamic authentication scheme using smart card mainly to provide anonymity, secure mutual authentication, and session key security. By the analysis of Troung et al's scheme, we observed that Troung et al' s scheme does not provide user anonymity, perfect forward secrecy, server's secret key security and does not allow the user to choose his/her password. We also identified that Troung et al's scheme is vulnerable to replay attack. To fix these security weaknesses, a robust authentication scheme is proposed and analyzed using the formal verification tool for measuring the robustness. From the observation of computational efficiency of the proposed scheme, we conclude that the scheme is more secure and easy to implement practically.
UR - http://www.scopus.com/inward/record.url?scp=85047659160&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85047659160&partnerID=8YFLogxK
U2 - 10.1002/dac.3701
DO - 10.1002/dac.3701
M3 - Article
AN - SCOPUS:85047659160
SN - 1074-5351
VL - 31
JO - International journal of digital and analog communication systems
JF - International journal of digital and analog communication systems
IS - 11
M1 - e3701
ER -