TY - GEN
T1 - Smart card based password authentication and user anonymity scheme using ECC and steganography
AU - Singh, Vineeta
AU - Dahiya, Priyanka
AU - Singh, Sanjay
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/1/1
Y1 - 2014/1/1
N2 - In this information age, providing security over the Internet is a major issue. Internet security is all about trust at a remote distance, because we are dealing with everyone remotely and not able to confirm identity or authenticity in the traditional sense. To increase the password authentication a scheme was proposed by Chun-Ta Li which is basically a smart card-based password authentication and update scheme. The Chun's scheme provides user anonymity and eviction of unauthorized users. In our research work we have crypt analyze the Chun's method and shown that it is vulnerable to various types of attacks: insider attack, off line password verifier attack, stolen verifier attack and impersonating attack. To overcome the security vulnerability of Chun's scheme, we have proposed an advance scheme of password authentication and user anonymity using Elliptic Curve Cryptography (ECC) and stegnography. The proposed scheme also provides privacy to the client. Based on scheme performance criteria such as immunity to known attacks and functional features, we came to the conclusion that the proposed scheme is much efficient and solves several hard security threats.
AB - In this information age, providing security over the Internet is a major issue. Internet security is all about trust at a remote distance, because we are dealing with everyone remotely and not able to confirm identity or authenticity in the traditional sense. To increase the password authentication a scheme was proposed by Chun-Ta Li which is basically a smart card-based password authentication and update scheme. The Chun's scheme provides user anonymity and eviction of unauthorized users. In our research work we have crypt analyze the Chun's method and shown that it is vulnerable to various types of attacks: insider attack, off line password verifier attack, stolen verifier attack and impersonating attack. To overcome the security vulnerability of Chun's scheme, we have proposed an advance scheme of password authentication and user anonymity using Elliptic Curve Cryptography (ECC) and stegnography. The proposed scheme also provides privacy to the client. Based on scheme performance criteria such as immunity to known attacks and functional features, we came to the conclusion that the proposed scheme is much efficient and solves several hard security threats.
UR - https://www.scopus.com/pages/publications/84927626375
UR - https://www.scopus.com/pages/publications/84927626375#tab=citedBy
U2 - 10.1109/ICACCI.2014.6968403
DO - 10.1109/ICACCI.2014.6968403
M3 - Conference contribution
AN - SCOPUS:84927626375
T3 - Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014
SP - 1614
EP - 1621
BT - Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014
A2 - Comer, Douglas E.
A2 - Mueller, Peter
A2 - Mallick, Bhawna
A2 - Mukherjea, Sougata
A2 - Thampi, Sabu M.
A2 - Krishnaswamy, Dilip
A2 - Sikora, Axel
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014
Y2 - 24 September 2014 through 27 September 2014
ER -