Skip to main content

Mutual Authentication Protocol Based on Smart Card and Combined Secret Key Encryption

  • Conference paper
  • First Online:
Advances in Swarm and Computational Intelligence (ICSI 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9141))

Included in the following conference series:

  • 1496 Accesses

Abstract

A mutual authentication scheme and secret key exchange based on combined secret key method is proposed. Use hardware including smart card, encryption cards or encryption machine to perform encryption and decryption. Hash function, symmetric algorithm and combined secret key method are applied at client and server. The authentication security is guaranteed due to the properties of hash function, combined secret key method and one-time mutual authentication token generation method. Mutual authentication based on smart card and one-time combined secret key can avoid guessing attack and replay attack. The mutual authentication method can be applied to cloud based application systems to realize mutual authentication and enhance security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Annual Authenitication Survey. http://cn.safenet-inc.com/news/2014/authentication-survey-2014-reveals-more-enterprises-adopting-multi-factor-authentication/?LangType=2052#sthash.dSnZBDMn.dpuf

  2. Chhabra, R.K., Verma, A.: Strong authentication system along with virtual private network: A secure cloud solution for cloud computing. International Journal of Electronics and Computer Science Engineering. 1(3), 1566–1573 (2012)

    Google Scholar 

  3. Vallabhu, H., Satyanarayana, R.V.: Biometric Authentication as a Service on Cloud: Novel Solution. International Journal of Soft Computing and Engineering (IJSCE) 2(4), 163–165 (2012). ISSN: 2231-2307

    Google Scholar 

  4. Rassan, I.A.L., AlShaher, H.: Securing Mobile Cloud Using Finger Print Authentication. International Journal of Network Security & Its Applications (IJNSA) 5(6), 41–53 (2013)

    Article  Google Scholar 

  5. Emam, A.H.M.: Additional Authentication and Authorization using Registered Email-ID for Cloud Computing. International Journal of Soft Computing and Engineering (IJSCE) 3(2), 110–113 (2013). ISSN: 2231-2307

    Google Scholar 

  6. Singh, M., Singh, S.: Design and Implementation of Multi-tier Authentication Scheme in Cloud. International Journal of Computer Science Issues 9(5), 181–187 (2012). No 2

    Google Scholar 

  7. Nafi, K.W., Kar, T.S., Hoque, S.A., Hashem, M.M.A.: A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture. (IJACSA) International Journal of Advanced Computer Science and Applications 3(10), 181–186 (2012)

    Google Scholar 

  8. Park, Y., Lee, Y.: Group-ID based RFID Mutual Authentication. Advances in Electrical and Computer Engineering 13(4), 9–12 (2013)

    Article  Google Scholar 

  9. Liu, A.-T., Chang, H.K.-C., Lo, Y.-S., Wang, S.-Y.: The Increase of RFID Privacy And Security With Mutual Authentication Mechanism In Supply Chain Management. International Journal of Electronic Business Management 10(1), 1–7 (2012)

    Article  Google Scholar 

  10. Le, X.H., Khalid, M., Sankar, R.: An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare. Journal of Networks 6(3), 355–364 (2011)

    Article  Google Scholar 

  11. Nayak, S.K., Mohapatra, S., Majhi, B.: An Improved Mutual Authentication Framework for Cloud Computing. International Journal of Computer Applications (0975-8887) 52(5), 36–41 (2012)

    Article  Google Scholar 

  12. Li, C.-T.: An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards. In: 2009 Fifth International Conference on Information Assurance and Security, pp. 517–520 (2009)

    Google Scholar 

  13. Baboo, S.S., Gokulraj, K.: An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks. I. J. Computer Network and Information Security 4, 30–38 (2012). MECS

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guifen Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhao, G., Du, L., Li, Y., Xu, G. (2015). Mutual Authentication Protocol Based on Smart Card and Combined Secret Key Encryption. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds) Advances in Swarm and Computational Intelligence. ICSI 2015. Lecture Notes in Computer Science(), vol 9141. Springer, Cham. https://doi.org/10.1007/978-3-319-20472-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20472-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20471-0

  • Online ISBN: 978-3-319-20472-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics