Abstract
With the rapid development of communication technologies, resources are distributed over multiple servers in the network. These resources are usually restricted to authorized users. To provide access control and secure communication in the network, remote user authentication and key establishment is found to be most important. A Reversible Cellular Automata based remote user authentication and key establishment scheme using smart card is proposed in this paper. The scheme is simple, less computational and robust against various known attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. SRC research report 39 (1990)
Chan, C.K., Cheng, L.M.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 46(4), 992–993 (2000)
Chang, C.C., Lee, J.: An efficient and secure multi-server password authentication scheme using smart cards. In: Proc of IEEE conf. CW 2004 (2004)
Fan, C., Chan, Y., Zhang, Z.: Robust remote authentication scheme with smart cards. Comp. & Sec. 24(8), 619–628 (2005)
Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T., Schott, B.: Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 75–89. Springer, Heidelberg (2002)
Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 46(1), 28–30 (2000)
Juang, W.S.: Efficient multi-server password authenticated key agreement using smart card. IEEE Trans. On Cons. Ele. 50(1), 251–255 (2004)
Kai-Chi, L., Cheng, L.M., Fong, A.S., Chi-Kwong, C.: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 49(4), 1243–1245 (2003)
Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 50(1), 204–207 (2004)
Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans. On Neural networks 12(6), 1498–1504 (2001)
Lamport, L.: Password Authentication with Insecure Communication. Comm. of the ACM 24, 770–772 (1981)
Lin, I.C., Hwang, M.S., Li, L.H.: A new remote user authentication scheme for multi-server architecture. Future Gen. Comp Sys 19, 13–22 (2003)
Pal Chaudhuri, P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S.: Additive Cellular Automata: Theory and Applications, vol. 1. Wiley-IEEE Computer Society Press (1997)
Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 49(2), 414–416 (2003)
Stinson, D.R.: Cryptography Theory and Practice, 2nd edn. Chapman & Hall CRC Press (2002)
Tripathy, S., Chowdhuri, A.R., Nandi, S.: CARA: Cellualr Automata based Remote user authentication. In: Proc of COMSWARE-2006 (2006)
Yang, C.C., Yang, H.W., Wang, R.C.: Cryptanalysis of Security enhancement for the timestamp based password authentication scheme using smart cards. IEEE Trans. on Cons. Ele. 50(2), 578–579 (2004)
Wolfram, S.: A New kind of Science, Wolfram Media Inc. (2002)
Wolfram, S.: Cryptography with cellular automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)
Wu, T., Hsu, C.: Efficient user identification scheme with key distribution preserving anonymity for distributed computer network. Comp. & Sec. 23, 120–125 (2004)
Yang, Y., Wang, S., Bao, F., Wang, J., Deng, R.: New efficient user identification and key distribution scheme providing enhanced security. Comp. & Sec. 23, 697–704 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tripathy, S., Nandi, S. (2006). Efficient Remote User Authentication and Key Establishment for Multi-server Environment. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds) Distributed Computing and Internet Technology. ICDCIT 2006. Lecture Notes in Computer Science, vol 4317. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11951957_30
Download citation
DOI: https://doi.org/10.1007/11951957_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68379-7
Online ISBN: 978-3-540-68380-3
eBook Packages: Computer ScienceComputer Science (R0)