TAILIEUCHUNG - Secure mutual authentication protocol
In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device. | International Journal of Computer Networks and Communications Security C VOL. 2, NO. 4, APRIL 2014, 142–145 Available online at: ISSN 2308-9830 N C S Secure Mutual Authentication Protocol Mrs. Seema P. Nakhate1, Prof. R. M. Goudar2 1, 2 Department of Computer Engineering, MIT Academy of Engg. Alandi , pune E-mail: 1spnakhate@, 2rmgoudar@ ABSTRACT In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device. ECC based mutual authentication protocol is best suited for constrained environments where the resources such as computational power, storage capacity are extremely limited. Devices are such as Mobile phones, PDA’s, palmtops, smart cards. Keywords: Double Authentication, Password change, Mutual Authentication, Session key agreement, ECC. 1 INTRODUCTION Most web services presently use passwords to authenticate the user. However, regardless of the strength of the passwords, this type of authentication is proving to be no longer sufficient, mainly because it can be easily exposed to attacks such as key logging and phishing. Strong electronic authentication is the identification of users based on two or more factors: something the user knows, such as a password; something the user possesses, such as a chip card, device (mobile); or something that characterizes the user, such as a fingerprint. Such strong authentication mechanisms already exist but, unfortunately, most of them have the drawback of being costly. They often use security tokens that are expensive to deploy and quite impractical for users. Hence, there is a need to create stronger authentication .
![](../images/loadingAnimation.gif)
đang nạp các trang xem trước