Cryptanalysis and Security Enhancement of a Khan et al.'sScheme
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: Remote user authentication, in which the resources are distributed among the recipients and theyare shared across the network in the form of network services provided by the remote systems. Before supplysuch services, the remote system should have the skill to authenticate the users. Otherwise, a discount couldimpersonate a legitimate user login to get access to the system. Currently, an efficient remoteauthentication in which using smart card have been widely adopted due to their low computational cost andconvenient portability for the authentication purpose. In smart card this field, there are many studies haverelied upon them, including a study by Khan et al. who claimed that he exceeded the weaknesses of Wang etal.'s scheme. But unfortunately Khan et al.'s scheme is still suffer from several the identified weaknesses whichis include preserve anonymity of a user, efficiency for wrong password login, forward secrecy and efficiencysession key agreement. So our propose which it includes the construction of authentication system dependingon 2FA , which is authentication scheme based on smart card, where it is surpassed the identified weaknessesof Khan et al.'s scheme which including preserve anonymity of a user, efficiency for wrong password login,forward secrecy and efficiency session key agreement.
Authors and Affiliations
Eman T. Jasim , Hameed A. Younis
The Grouping of Files in Allocation of Job Using ServerScheduling In Load Balancing
Abstract: The Task scheduling is an importantevent for the act of network infrastructure, in the reality of usersrequest and dependency of load the network to provide convenient quality of service for managing the millio...
Pervasive Computing Applications And Its Security Issues &Challenges
Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere...
A Survey on: Stratified mapping of Microarray Gene Expressiondatasets to decision tree algorithm aided through EvolutionaryDesign
Abstract: Analyzing gene expression data is a challenging task since the large number of features against theshortage of available examples can be prone to over fitting. In order to avoid this pitfall and achieve h...
A Fast Convergence and Quick Route Updates Based EnergyAware Tree-Based Routing Protocol for Mobile WSNS
Abstract: Wireless Sensor Networks is the result of latest advancements in the field of wireless technology. Therecent upgrades to the wireless network provides the opportunity to wireless sensor networks to fully...
Opinion Mining Method for Sentiment Analysis
Abstract: We are living in a world full of data. Every passing second, large data is generated by Social Media, ECommerce, Stock Exchange and many other platforms. Now-a-days, microblogging sites are used for manypurpose...