TAILIEUCHUNG - Secure mutual authentication protocol

In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 4, APRIL 2014, 142–145 Available online at: ISSN 2308-9830 N C S Secure Mutual Authentication Protocol Mrs. Seema P. Nakhate1, Prof. R. M. Goudar2 1, 2 Department of Computer Engineering, MIT Academy of Engg. Alandi , pune E-mail: 1spnakhate@, 2rmgoudar@ ABSTRACT In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device. ECC based mutual authentication protocol is best suited for constrained environments where the resources such as computational power, storage capacity are extremely limited. Devices are such as Mobile phones, PDA’s, palmtops, smart cards. Keywords: Double Authentication, Password change, Mutual Authentication, Session key agreement, ECC. 1 INTRODUCTION Most web services presently use passwords to authenticate the user. However, regardless of the strength of the passwords, this type of authentication is proving to be no longer sufficient, mainly because it can be easily exposed to attacks such as key logging and phishing. Strong electronic authentication is the identification of users based on two or more factors: something the user knows, such as a password; something the user possesses, such as a chip card, device (mobile); or something that characterizes the user, such as a fingerprint. Such strong authentication mechanisms already exist but, unfortunately, most of them have the drawback of being costly. They often use security tokens that are expensive to deploy and quite impractical for users. Hence, there is a need to create stronger authentication .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.