Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Remote password authentication with smart cards

Remote password authentication with smart cards

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings E (Computers and Digital Techniques) — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system verifies the remotely submitted password to check if the login request is accepted or rejected. A signature scheme and communication timestamps are provided in the authentication phase against the potential attacks of replaying a previously intercepted login request.

References

    1. 1)
      • L. Lamport . Password authentication with insecure communication. Commun. ACM , 11 , 770 - 772
    2. 2)
      • G.P. Purdy . A high security log-in procedure. Commun. ACM , 8 , 442 - 445
    3. 3)
      • Hwang, T.Y.: `Passwords authentication using public-key encryption', Proc. Int. Carnahan Conf Security Technology, October 1983, Zurich, Switzerland, p. 35–38.
    4. 4)
      • D.W. Davies , W.L. Price . (1984) , Security of computer networks.
    5. 5)
      • M.R. Schroeder . (1985) , Number theory in science and communication.
    6. 6)
      • Laih, C.S., Harn, L., Huang, D.: `Passward authentication using quadratic residues', Proc. 1988 Int. Computer Symp., December 1988, Taipei, Taiwan, p. 1484–1489.
    7. 7)
      • G.I. Davida , D.L. Wells , J.B. Kam . A database encryption system with subkeys. ACM Trans. Database Syst. , 2 , 312 - 328
    8. 8)
      • Chang, C.C., Wu, T.C.: `A password authentication scheme without verification tables', Proc. 8th IASTED Int. Symp. Applied Informatics, February 1990, Innsbruck, Austria, p. 202–204.
    9. 9)
      • A. Shamir . Identity-based cryptosystems and signature schemes, Proc. CRYPTO'84.
    10. 10)
      • R. Morris , K. Thompson . Password security: a case study. Commun. ACM , 11 , 594 - 597
    11. 11)
      • A. Evans , W. Kantrowitz , E. Weiss . A user authentication scheme not requiring secrecy in the computer. Commun. ACM , 8 , 437 - 442
    12. 12)
      • E. Okamoto . Identity-based information security management system for personal computer networks. IEEE J. Sel. Areas Commun. , 2 , 290 - 294
    13. 13)
      • Chang, C.C., Wu, L.H.: `A password authentication scheme based upon Rabin's public-key cryptosystems', Proc. Int. Conf. Systems Management '90, June 1990, Hong Kong, p. 425–429.
    14. 14)
      • D. Denning . (1982) , Cryptography and data security.
    15. 15)
      • R.L. Rivest , A. Shamir , L. Adleman . A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM , 2 , 120 - 126
    16. 16)
      • D.E. Denning , G.M. Sacco . Timestamps in key distribution protocols. Commun. ACM , 8 , 533 - 536
    17. 17)
      • R.E. Lennon , S.M. Matyas , C.H. Meyer . Cryptographic authentication of time-invariant quantities. IEEE Trans. , 6 , 773 - 777
    18. 18)
      • H. Feistel , W.A. Notz , J.L. Smith . Some cryptographic techniques for machine to machine data communications. Proc. IEEE , 11 , 1545 - 1554
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-e.1991.0022
Loading

Related content

content/journals/10.1049/ip-e.1991.0022
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address