Design an efficient three-party authenticated key exchange protocol in the cloud environment
|
|
|
- Edmund Whitehead
- 10 years ago
- Views:
Transcription
1 Design an efficient three-party authenticated key exchange protocol in the cloud environment Chung-Yi Lin a, *, Yuh-Min Chen a, Shu-Yi Liaw b, Chen-Hua Fu c a Institute of Manufacturing Information Systems, National Cheng Kung University, Tainan, ROC b Department of usiness dministration, National Pingtung University Science Technology, Pingtung, ROC c Department of Information Management, National Defense University, Taipei, ROC * Corresponding author address: p @gmailcom STRCT With the emergence of cloud, conventional threeparty authenticated key exchange (3PKE) protocols face two common problems; one is that the server users are not in the same domain, therefore, the shared authenticated keys may be unknowingly compromised The other problem is these protocols require higher on-line computation cost on-line communication cost during session key agreement, which can create excessive overhead for cloud clients using devices with low computational capacity This paper proposes a novel protocol based on the self-verified token pair scheme employed by Chen et al The proposed protocol does not require that the authenticated keys be stored in clouds to achieve user authentication Furthermore, it overcomes the security threats existing in the protocol developed by Chen et al improves the performance in session key agreement to make it suitable for 3PKE in cloud environments Keywords: 3PKE, uthenticated key exchange, Cloud environment I INTRODUCTION Since the first key exchange protocol was proposed by Diffie Hellman [1], a number of researchers have proposed schemes with similar authentication functions such as [2][3][4][5] Steiner et al proposed that users share their authenticated keys with a trusted server for mutual authentications in subsequent session key agreements [6] This became known as the three-party authenticated key exchange (3PKE) protocol However, the protocol developed by Steiner et al is unable to detect on-line guessing or off-line password-guessing attacks To eliminate the threat of such attacks, some schemes using server public keys such as [7][8] Nevertheless, these schemes rely on public-key infrastructure create excessive computational overhead, making them unsuitable for environments with limited computational resources lthough recent 3PKE protocols such as [9][10][11][12] do not use server public keys, the emergence of cloud presents new challenges First of all, the server the users are not necessarily in the same trusted domain Even if a cloud could replace the server assist two communication parties in mutual authentication, storing the shared authenticated keys in the cloud would pose the risk of keys being compromised The equipment used by cloud clients, such cell phones e-readers, are extremely limited with regard to computational capabilities, memory, communication bwidth, battery power [13][14] The means of adapting conventional 3PKE protocols to cloud environments is thus an issue worthy of further investigation For cloud clients using 3PKE with such devices, we concur that some of the systems applications may be required to expend on-line resources for computation communication simultaneously, which could lead to excessive overhead Chen et al proposed a protocol with a self-verified token pair scheme that does not require the additional storage of sensitive tables in the server to achieve user authentication [15] In this scheme, the server hides the secret key derived in the self-verified token pair given to a specific user Subsequently, the server requires only its private key the self-verified token pair sent by the user to obtain the shared authenticated key This provides an ideal method to secure authenticated keys stored in clouds; however, Yang Chang pointed out that this protocol is unable to withst stolen-verifier attacks [16] Nose further noted that once an adversary obtains an authenticated key, a key-compromise impersonation attack can be initiated [17] Yang Chang also pointed out that the protocol proposed by Chen et al requires higher on-line computational costs communication loads in reaching session key agreement, therefore, the protocol is inappropriate for the limited resources of mobile devices To develop a 3PKE protocol suitable for cloud environments, this paper proposes a novel protocol based on the scheme established by Chen et al with the objective of obtaining better security performance in session key agreement II PRELIMINRIES System model Figure1 illustrates the proposed system model The participating parties include Initiator, Responder, the cloud To achieve mutual authentication, must register with the cloud to obtain the respective authenticated keys that the cloud shares with them eforeh, generate the rom exponents components required to produce the session key as well as the verification values of their components During session key agreement, exchange their components, through the cloud, they exchange the verification values of their components When receive the verification value, they use it to verify the integrity of the component sent to them earlier Subsequently, when wish to establish secure communication at a specific time, they can use their own rom exponent the component from the other party to generate a common session key
2 Initiator Cloud Responder Step 3 retrieves Step 4 rn c _ rn h psw computes c _ sk sk k1 rn k 1 h psw, rn Step 5 saves c sk, tok1 _ s component s verification value of component s component s verification value of component undergoes the same procedure saves c _ sk, tok1 Figure 1 Conceptual model TLE I NOTTIONS Security requirements We assume that two types of adversaries exist in the environment: illegal (unregistered) malicious users, referred to as external adversaries, legal (registered) malicious users, referred to as internal adversaries oth types of adversary may attempt to steal the shared authenticated keys private rom exponents through stolen-verifier attacks to enable impersonation attacks crack session keys Internal adversaries may also try to impersonate Initiator or Responder through cloud authentication during session key agreement, thereby tricking the other party into opening a session with them In view of the above, we conclude that the security requirements include (1) ensuring the confidentiality of the shared authenticated keys the private rom exponents to oppose stolen-verifier attacks (2) ensuring that internal adversaries are unable to perform impersonation-of-initiator attacks or impersonation-of-responder attacks III PROPOSED PROTOCOLS The notation used in the proposed protocol is presented in TableⅠ Sections describe the phase, procedures computation steps Initialization phase In this phase, perform the same procedures Take for instance 1) Registration procedure: Prior to this procedure, must first select generate a rom number before Then, applies for registration in the cloud: c _ rn rn h psw rn 1 rn q psw Step 1 The cloud generates a rom number sk H, 1 q computes ID Step 2 Cloud computes g mod p generates selfverified token pair through Then, cloud delivers to tok 1 h, ID tok1 q tok2 x tok1 mod sk, tok1, tok2 Notations Definition h a collision-free one way hash function the exclusive operator the concatenation operator p, q two large primes, whereby g x sk, sk tok1 tok1 ra, ra R, R k1, k1 a generator, g q 1mod p q p 1 in Z * p the private key of the cloud the authenticated keys generated by the cloud shared with, the self-verified token pairs generated by the cloud for, the rom exponents generated by, the components of session key generated by, the encryption keys used by, to encrypt their authenticated key k2, k2 the encryption keys used by, to encrypt their v, v vc, vc v _ R, v _ R 2) Pre-process procedure: Step 1 Step 2 rom component identity verification values generated by identity verification values generated by the cloud to give to the verification values generated by for their component generates one time rom number ra computes R g mod p retrieves by k 2 h rn, psw rn c _ rn h psw rn Step 3 computes into n blocks with the same bit-, such as, Step 4 divides lengths as computes Step 5 R saves ra k2 ra Z * p r 1, r2,, rn c1,, cn r1 k2, rn k2 R c1,, cn, undergoes the same procedure saves c _, ra KE phase: 1) Round 1:
3 Step1 retrieves k 1 hpsw, rn Step2 retrieves Step3 generates Step4 generates identity verification value Step5 sends to the cloud, respectively k1 sk c _ sk k1 v _ R h ID, R T sk v _ R v h ID, T, v _ R, sk rn c _ rn h psw R ID, ID, ID, T, v _ R, v, tok1 2) Round 2: Upon receiving the message delivered by, does the following: k1 Step 1 retrieves Step 2 retrieves sk Step 3 generates Step 4 generates identity verification value Step 5 sends to the cloud, respectively, saves temporarily Similarly, upon receiving the message from, saves temporarily rn c _ rn h psw sk c _ sk k1 v _ R h ID, R T v h ID, T, v _ R, sk v _ R k 1 h psw, rn ID, R ID, ID, T, v _ R, v, tok1 R R 3) Round 3: fter receiving the messages from, the cloud follows the steps below: Step1 The cloud authenticates Step11 Step12 The cloud verifies whether the timestamps respectively created by are fresher than those of the last request The cloud retrieves sk ' H, ' Similarly, the cloud sk' ' tok2 xtok1 mod q also ID retrieves sk' by ' tok2 xtok1 mod q sk ' H ID, ' Step13 The cloud verifies v v, such as v?hid,t,v _ R,sk' v?h ID,T,v _ R,sk' Step14 The cloud generates vc H ID,v_ R,sk' vc H ID respectively Step15 The cloud sends ID, ID, vc vc vc,v _ R,sk' ID, ID, vc, such as for, to, respectively Upon receiving the message from the cloud, respectively use R R to verify vc vc,such as vc?hid,hid,r, sk If they pass verification, then, vc?h ID,h ID,R sk R R confirm the integrity of Thereafter, when wish the establish secure communication at a given time, computes, retrieves rn c _ rn h psw ra k 2 h rn, psw, obtains the common session key session key retrieves ra ra c1 k2 cn k2 R ra mod p In the same manner, obtains the common session key by session key p R ra mod IV SECURITY NLYSIS In this section, we assess whether the proposed protocol meets the security requirements efore the security demonstration, we emphasize the following facts to assist in security analysis: (1) discrete logarithm problems (DLP) D-H problems (DHP) are difficult to solve, (2) one way hash functions are collision-free irreversible, (3) clouds can protect their private keys from being compromised These are widely accepted baselines in security Furthermore, we assume that one way hash functions rom number algorithms are sufficiently secure have the same bit-lengths In addition to the original parties,, the cloud, the parties of the security demonstration also include external adversary internal adversary Proposition1: The proposed protocol can withst stolen-verifier attacks We use party is attacked as an example The proof of our proposition is as follows To ensure the confidentiality of authenticated key rom exponent, computes to generate encryption keys k2 Then, uses to encrypt sk as uses k2 to encrypt the blocks divided from, thereby deriving s or use the same attack approaches, we will explain the attack using an attack by as an example Suppose attacks steals c _ sk, c _ ra, k 1 h psw, rn sk k1 c _ sk sk k1 r1 k1,, rn k1 c _ rn k2 c _ rn k 2 h rn, psw ra To obtain sk ra k1 ra, must first gain k1 rn from h psw, cannot know Therefore, attempts to gain psw or ecause c _ rn rn
4 either or Even if performs a brute force attack, they cannot differentiate the real or from Consequently, can only guess Say are both 128 bits The chances of correctly guessing or is 1/2 128, thus, it is unlikely that will be able to derive or This demonstrates that the proposed protocol can achieve our proposition k2 psw rn psw rn psw c _ rn rn k1 The protocol can withst impersonation attacks The proof of Proposition 1 shows that neither nor can obtain the authenticated key of s a result, they cannot pass the authentication of the cloud with messages forged as though they were from However, possesses a shared authenticated key with which both impersonation-of-initiator impersonation-of-responder attacks could be attempted elow is our proof with regard to Proposition 2 CSE 1 Impersonation-of-initiator attack: Suppose impersonates attempts to establish a session with sends to the cloud, respectively Upon receiving the message, sends to the cloud, respectively Subsequently, must intercept messages from the channel between tamper with the message from the channel between the cloud by changing it to in an attempt to pass the authentication of the cloud will think that they are establishing a session with when in fact they are doing so with However, cannot impersonate because the verification value generated by is ; if changed to, the cloud would discover that v hid,t,c_ R, sk s a result, would be unable to pass the authentication of the cloud ID, ID, T, c _ R, v, tok1, tok 2 ID, v _ R v h ID ID, v _ R ID, ID, T, c_ R, v, tok1 ID,ID,T,cR,v, tok1,t,c _ R, sk ID ID CSE 2 Impersonation-of-responder attack: Supposing wishes to establish a session with, sends ID, v _ R ID, ID, T, c _ R, v, tok1, tok2 to the cloud, respectively tampers with the message from the communication channel between the cloud by changing it to intercepts the messages in the communication channel between Moreover, sends ID, ID, T, c _ R, v, tok1 ID, ID, T, c_ R, v, tok1, tok 2 ID, v _ R to the cloud, respectively, in an attempt to pass the authentication of the cloud make think a session is being established with, when in fact the session is with However, is unable to impersonate because the verification value generated by is v hid, T, c _ R, sk ; if changed ID to ID, the cloud would discover that s a result, would be unable to pass the authentication of the cloud v h ID, T, c _ R, sk V EFFICIENCY NLYSIS We compared the proposed protocol with that proposed by Chen et al with regard to performance in communication costs on-line computation costs Communication cost We compared the communication costs of the two protocols with regard to communication efficiency the size of messages being transmitted 1) Communication efficiency: We used the number of rounds times of communication to examine the communication efficiency of the protocol The proposed protocol requires 3 rounds 6 communications In contrast, the protocol proposed by Chen et al requires 3 rounds 7 communications The protocol proposed in this paper demonstrates superior communication efficiency 2) Message transmission size: Chen et al assumed that the sizes of q are 1,024 bits 160 bits, the output size of one way hash function is 128 bits, the size of the timestamp is 96 bits, the size of ID is negligible We thus compared the sizes of messages transmitted from 3 rounds using the proposed protocol that proposed by Chen et al based on the aforementioned assumptions Figure 2 presents the results In both the first second rounds, the costs of the proposed protocol were * bits, whereas in the third round, the cost was 2*128 bits Thus, the total size of messages transmitted was 3584 bits This result is approximately 2240 bits smaller than that using the protocol proposed by Chen et al On-line computation cost: The session key agreement requires on-line computation; therefore, we compared the proposed protocol that proposed by Chen et al with regard to the computation costs required in the KE phase The symbols used to analyze the computation cost are presented in Table Ⅱ s introduced in previous studies as [18][19][20], the relationships of the various computation costs can be determined as shown in Table Ⅲ Table Ⅳ compares the total computation costs required by,, the server (cloud) in the proposed protocol that proposed by Chen et al Figure 3 displays the computation costs required in each round To facilitate the comparisons in Figure 3, we converted the costs of T EXP T MUL into cost of T H The results of the comparisons indicate that the proposed protocol imposes significantly lower computation costs than that proposed by Chen et al with the exception of the cloud, which induces computation costs higher than those of the server in the protocol developed by Chen et al Regardless, clouds are likely to have greater computation capabilities, therefore, such costs will not cause excessive computational overhead p
5 Symbol T EXP T MUL T DD T H T Figure 2 Comparison of size of messages transmitted TLE II SYMOLS USED TO NLYZE COMPUTTION COSTS Definition Cost of one modular exponential operation Cost of one modular multiplication operation Cost for one modular addition operation Cost of one hash function operation Cost of one exclusive OR operation TLE III RELTIONSHIPS MONG VRIOUS OPERTIONS 3PKE Chen et al 1 T EXP 240 T MUL 1 T EXP 600 T H 1 T H 04 T MUL T DD is negligible T is negligible TLE IV COMPRISON OF COMPUTTIONL COSTS 2T EXP+ 4T H 2T EXP+ 4T H proposed 7T H 7T H Computation cost Server (Cloud) 2T MUL+ 6T H 2T MUL+ 12T H Total 4T EXP+2T MUL+ 14T H 2T MUL+26T H Figure 3 Comparison of computational costs required in each round The above analysis demonstrates that the proposed protocol has better communication efficiency transmits smaller messages that the protocol developed by Chen et al Furthermore, in the KE phase, the proposed protocol significantly reduces computational costs for the two communication parties with regard to session key agreement VI CONCLUSION The objective of this paper was to improve the protocol proposed by Chen et al in terms of security performance during session key agreement to make it applicable to 3PKE in cloud environments Security analysis shows that the proposed protocol is able to withst stolen-verifier attacks as well as impersonation attacks Efficiency analysis indicates that the proposed protocol has higher communication efficiency transmits smaller messages than the protocol developed by Chen et al In addition, the proposed protocol significantly reduces the overhead of on-line computation for the two communication parties during session key agreement We can thus conclude that the proposed protocol is suitable for 3PKE in cloud environments This paper assumes that the cloud is honest follows the required security service agreement However, malicious clouds are still possible, we therefore plan to develop a 3PKE protocol capable of withsting malicious attacks even from the clouds themselves REFERENCES [1] W Diffie, MHellman, New directions in cryptography, IEEE Trans Inform Theory, vol 22, pp644 54, 1976 [2] SM ellovin, M Merrit, Encrypted key exchanged: Password-based protocols secure against dictionary attacks, in: Proc of IEEE Symposium on Security Privacy, pp72 84, 1992 [3] V oyko, P Mackenzie, S Patel, Provably secure password authenticated key exchange using Diffie- Hellman, in: Proceedings of EUROCRYPT 2000, dvances in Cryptology Springer-Verlag, pp , 2000 [4] O Goldreich, Y Lindell, Session-key generation using human passwords only, in: Proceedings of CRYPTO 2001, dvances in Cryptology Springer- Verlag, vol 2139, pp , 2001 [5] R Gennaro, Y Lindell, framework for passwordbased authenticated key exchange, In: Proceedings of EUROCRYPT 2003, dvances in Cryptology Springer- Verlag, vol 2656, pp , 2003 [6] M Steiner, G Tsudik, M Waidner, Refinement extension of encrypted key exchange,, CM SIGOPS Operating Systems Review, vol 29, pp22-30, 1995 [7] CL Lin, HM Sun, THwang, Three-party encrypted key exchange: attacks a solution, CM SIGOPS Operating System Review, vol 34, pp12-20, 2000 [8] H-M Sun, -C Chen, T, Hwang, Secure key agreement protocols for three-party against guessing attacks, The Journal of Systems Software, vol 75, pp63-68, 2005 [9] R Lu, Z Cao, Simple three-party exchange protocol, Computers & Security, vol 26, pp94-97, 2007 [10] TF Lee, T Hwang, Simple password-based three-party authenticated key exchange without server public keys, Information Sciences, vol180, pp , 2010 [11] TY Chang, MS Hwang, WP Yang, communication-efficient three-party password authenticated key exchange protocol, Information Sciences, vol 181, pp , 2011 [12] C Lv, M Ma, H Li, J Ma, Y Zhang, n novel threeparty authenticated key exchange protocol using one-time key, Journal of Network Computer pplication, vol 36, pp , 2013
6 [13] M Conti, et al, Looking ahead in pervasive : Challenges opportunities in the era of cyber physical convergence, Journal of Pervasive Mobile Computing, vol 8, pp2-21, 2012 [14] Q Shi, N Zhang, D-L Jones, Efficient autonomous signature exchange on ubiquitous networks, Journal of Network Computer pplication, vol35, pp , 2012 [15] TZ Chen, W Lee, H Chen, round- computation-efficient three-party authenticated key exchange protocol, The Journal of Systems Software, vol 81, pp , 2008 [16] JH Yang, CC Chang, n efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, The Journal of Systems Software, vol 82, pp , 2009 [17] P Nose, Security weaknesses of authenticated key agreement protocols, Information Processing Letters, vol 111, pp , 2011 [18] YP Liao, SS Wang, secure dynamic ID based remote user authentication scheme for multi-server environment, Computer Stards & Interfaces, vol31, pp24-29, 2009 [19] Z Li, J Higgins, M Clement, Performance of finite field arithmetic in an elliptic curve cryptosystem, IEEE Computer Society, pp , 2001 [20] RC Wang, WS Juang, CL Lei, Web Metering Scheme for Fair dvertisement Transactions, International Journal of Security Its pplications, vol 2, pp49-56, 2008
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC
International Journal of Network Security, Vol.18, No.2, PP.217-223, Mar. 2016 217 A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC Dianli Guo and Fengtong
An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences 177 (2007) 1376 1381 www.elsevier.com/locate/ins A novel deniable authentication protocol using generalized ElGamal signature scheme Wei-Bin Lee a, Chia-Chun Wu a, Woei-Jiunn Tsaur
Efficient Nonce-based Authentication Scheme for. session initiation protocol
International Journal of Network Security, Vol.9, No.1, PP.12 16, July 2009 12 Efficient Nonce-based Authentication for Session Initiation Protocol Jia Lun Tsai Degree Program for E-learning, Department
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Index-Terms - S-Box Key Exchange, DSKE Method, And Three Layer Security, Modified Diffie-Hellman Key Exchange.
Secured and Authenticated Communication in Cloud Using Dynamic Key Exchange Protocol Abstract -Cloud computing is a new type of service which provides large scale computing resources to each customer.
On the Limits of Anonymous Password Authentication
On the Limits of Anonymous Password Authentication Yan-Jiang Yang a Jian Weng b Feng Bao a a Institute for Infocomm Research, Singapore, Email: {yyang,baofeng}@i2r.a-star.edu.sg. b School of Computer Science,
Efficient nonce-based authentication scheme for Session Initiation Protocol
Efficient nonce-based authentication scheme for Session Initiation Protocol Jia Lun Tsai National Chiao Tung University, Taiwan, R.O.C. [email protected] Abstract: In recent years, Session Initiation
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES
NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT
SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTING SECURITY ENVIRONMENT K.karthika 1, M. Daya kanimozhi Rani 2 1 K.karthika, Assistant professor, Department of IT, Adhiyamaan College of Engineering, Hosur
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key
International Journal of Network Security, Vol.18, No.6, PP.1060-1070, Nov. 2016 1060 A Stubborn Security Model Based on Three-factor Authentication and Modified Public Key Trung Thanh Ngo and Tae-Young
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol. Vahid Jahandideh and Amir S.
72 Int. J. Electronic Governance, Vol. 3, No. 1, 2010 Cryptanalysis and security enhancement on the generation of Mu-Varadharajan electronic voting protocol Vahid Jahandideh and Amir S. Mortazavi Department
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Secure File Transfer Using USB
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 Secure File Transfer Using USB Prof. R. M. Goudar, Tushar Jagdale, Ketan Kakade, Amol Kargal, Darshan Marode
Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures
Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Cryptography. Debiao He. School of Mathematics and Statistics, Wuhan University, Wuhan, People s Republic of China. hedebiao@163.
Weakness in a Mutual Authentication cheme for ession Initiation Protocol using Elliptic Curve Cryptography Debiao He chool of Mathematics and tatistics, Wuhan University, Wuhan, People s Republic of China
A Factoring and Discrete Logarithm based Cryptosystem
Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications
A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications G.Prakash #1, M.Kannan *2 # Research Scholar, Information and Communication Engineering, Anna University
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
A SMART CARD-BASED MOBILE SECURE TRANSACTION SYSTEM FOR MEDICAL TREATMENT EXAMINATION REPORTS. Received January 2010; revised May 2010
International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 5(A), May 2011 pp. 2257 2267 A SMART CARD-BASED MOBILE SECURE TRANSACTION
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography
Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
A blind digital signature scheme using elliptic curve digital signature algorithm
A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Improved Online/Offline Signature Schemes
Improved Online/Offline Signature Schemes Adi Shamir and Yael Tauman Applied Math. Dept. The Weizmann Institute of Science Rehovot 76100, Israel {shamir,tauman}@wisdom.weizmann.ac.il Abstract. The notion
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves
Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science [email protected] Abstract Self-Certified
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment
, pp.257-272 http://dx.doi.org/10.14257/ijsia.2014.8.1.24 Secure Data Management Scheme using One-Time Trapdoor on Cloud Storage Environment Sun-Ho Lee and Im-Yeong Lee 1 Department of Computer Software
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme
On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme Manoj Kumar Department of Mathematics R. K. College Shamli-Muzaffarnagar,.P.-India - 247776 E-mail: yamu [email protected]
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
Formal Analysis of A Novel Mutual Authentication and ey Agreement Protocol Ja'afer M. AL-Saraireh Applied Science University Amman 11961, Jordan Saleh S. Saraireh Philadelphia University Amman 11961, Jordan
Overview of Public-Key Cryptography
CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631
Cunsheng DING, HKUST Lecture 08: Key Management for One-key Ciphers Topics of this Lecture 1. The generation and distribution of secret keys. 2. A key distribution protocol with a key distribution center.
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Comments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
A Novel Approach for Signing Multiple Messages: Hash- Based Signature
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. International Research Publications House http://www. irphouse.com A Novel Approach for Signing
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5
Third Party Auditing For Secure Data Storage in Cloud through Trusted Third Party Auditor Using RC5 Miss. Nupoor M. Yawale 1, Prof. V. B. Gadicha 2 1 Student, M.E. Second year CSE, P R Patil COET, Amravati.INDIA.
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
