Skip to main content

Efficient Remote User Authentication and Key Establishment for Multi-server Environment

  • Conference paper
  • 496 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4317))

Abstract

With the rapid development of communication technologies, resources are distributed over multiple servers in the network. These resources are usually restricted to authorized users. To provide access control and secure communication in the network, remote user authentication and key establishment is found to be most important. A Reversible Cellular Automata based remote user authentication and key establishment scheme using smart card is proposed in this paper. The scheme is simple, less computational and robust against various known attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. SRC research report 39 (1990)

    Google Scholar 

  2. Chan, C.K., Cheng, L.M.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 46(4), 992–993 (2000)

    Article  Google Scholar 

  3. Chang, C.C., Lee, J.: An efficient and secure multi-server password authentication scheme using smart cards. In: Proc of IEEE conf. CW 2004 (2004)

    Google Scholar 

  4. Fan, C., Chan, Y., Zhang, Z.: Robust remote authentication scheme with smart cards. Comp. & Sec. 24(8), 619–628 (2005)

    Article  Google Scholar 

  5. Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T., Schott, B.: Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 75–89. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 46(1), 28–30 (2000)

    Article  Google Scholar 

  7. Juang, W.S.: Efficient multi-server password authenticated key agreement using smart card. IEEE Trans. On Cons. Ele. 50(1), 251–255 (2004)

    Article  Google Scholar 

  8. Kai-Chi, L., Cheng, L.M., Fong, A.S., Chi-Kwong, C.: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 49(4), 1243–1245 (2003)

    Article  Google Scholar 

  9. Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 50(1), 204–207 (2004)

    Article  Google Scholar 

  10. Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. On Neural networks 12(6), 1498–1504 (2001)

    Article  Google Scholar 

  11. Lamport, L.: Password Authentication with Insecure Communication. Comm. of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  12. Lin, I.C., Hwang, M.S., Li, L.H.: A new remote user authentication scheme for multi-server architecture. Future Gen. Comp Sys 19, 13–22 (2003)

    Article  MATH  Google Scholar 

  13. Pal Chaudhuri, P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications, vol. 1. Wiley-IEEE Computer Society Press (1997)

    Google Scholar 

  14. Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 49(2), 414–416 (2003)

    Article  Google Scholar 

  15. Stinson, D.R.: Cryptography Theory and Practice, 2nd edn. Chapman & Hall CRC Press (2002)

    Google Scholar 

  16. Tripathy, S., Chowdhuri, A.R., Nandi, S.: CARA: Cellualr Automata based Remote user authentication. In: Proc of COMSWARE-2006 (2006)

    Google Scholar 

  17. Yang, C.C., Yang, H.W., Wang, R.C.: Cryptanalysis of Security enhancement for the timestamp based password authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 50(2), 578–579 (2004)

    Article  Google Scholar 

  18. Wolfram, S.: A New kind of Science, Wolfram Media Inc. (2002)

    Google Scholar 

  19. Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)

    Google Scholar 

  20. Wu, T., Hsu, C.: Efficient user identification scheme with key distribution preserving anonymity for distributed computer network. Comp. & Sec. 23, 120–125 (2004)

    Article  Google Scholar 

  21. Yang, Y., Wang, S., Bao, F., Wang, J., Deng, R.: New efficient user identification and key distribution scheme providing enhanced security. Comp. & Sec. 23, 697–704 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tripathy, S., Nandi, S. (2006). Efficient Remote User Authentication and Key Establishment for Multi-server Environment. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds) Distributed Computing and Internet Technology. ICDCIT 2006. Lecture Notes in Computer Science, vol 4317. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11951957_30

Download citation

  • DOI: https://doi.org/10.1007/11951957_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68379-7

  • Online ISBN: 978-3-540-68380-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics