Cryptanalysis and Security Enhancement of a Khan et al.'sScheme

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2

Abstract

 Abstract: Remote user authentication, in which the resources are distributed among the recipients and theyare shared across the network in the form of network services provided by the remote systems. Before supplysuch services, the remote system should have the skill to authenticate the users. Otherwise, a discount couldimpersonate a legitimate user login to get access to the system. Currently, an efficient remoteauthentication in which using smart card have been widely adopted due to their low computational cost andconvenient portability for the authentication purpose. In smart card this field, there are many studies haverelied upon them, including a study by Khan et al. who claimed that he exceeded the weaknesses of Wang etal.'s scheme. But unfortunately Khan et al.'s scheme is still suffer from several the identified weaknesses whichis include preserve anonymity of a user, efficiency for wrong password login, forward secrecy and efficiencysession key agreement. So our propose which it includes the construction of authentication system dependingon 2FA , which is authentication scheme based on smart card, where it is surpassed the identified weaknessesof Khan et al.'s scheme which including preserve anonymity of a user, efficiency for wrong password login,forward secrecy and efficiency session key agreement.

Authors and Affiliations

Eman T. Jasim , Hameed A. Younis

Keywords

Related Articles

 The Grouping of Files in Allocation of Job Using ServerScheduling In Load Balancing

Abstract: The Task scheduling is an importantevent for the act of network infrastructure, in the reality of usersrequest and dependency of load the network to provide convenient quality of service for managing the millio...

 Pervasive Computing Applications And Its Security Issues &Challenges

 Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere...

 A Survey on: Stratified mapping of Microarray Gene Expressiondatasets to decision tree algorithm aided through EvolutionaryDesign

 Abstract: Analyzing gene expression data is a challenging task since the large number of features against theshortage of available examples can be prone to over fitting. In order to avoid this pitfall and achieve h...

A Fast Convergence and Quick Route Updates Based EnergyAware Tree-Based Routing Protocol for Mobile WSNS

 Abstract: Wireless Sensor Networks is the result of latest advancements in the field of wireless technology. Therecent upgrades to the wireless network provides the opportunity to wireless sensor networks to fully...

Opinion Mining Method for Sentiment Analysis

Abstract: We are living in a world full of data. Every passing second, large data is generated by Social Media, ECommerce, Stock Exchange and many other platforms. Now-a-days, microblogging sites are used for manypurpose...

Download PDF file
  • EP ID EP127211
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Eman T. Jasim, Hameed A. Younis (2015).  Cryptanalysis and Security Enhancement of a Khan et al.'sScheme. IOSR Journals (IOSR Journal of Computer Engineering), 17(2), 8-16. https://www.europub.co.uk/articles/-A-127211