CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

by Aqeel Khalique, Kuldip Singh, Sandeep Sood
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 3
Year of Publication: 2010
Authors: Aqeel Khalique, Kuldip Singh, Sandeep Sood
10.5120/647-903

Aqeel Khalique, Kuldip Singh, Sandeep Sood . A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards. International Journal of Computer Applications. 2, 3 ( May 2010), 26-30. DOI=10.5120/647-903

@article{ 10.5120/647-903,
author = { Aqeel Khalique, Kuldip Singh, Sandeep Sood },
title = { A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards },
journal = { International Journal of Computer Applications },
issue_date = { May 2010 },
volume = { 2 },
number = { 3 },
month = { May },
year = { 2010 },
issn = { 0975-8887 },
pages = { 26-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume2/number3/647-903/ },
doi = { 10.5120/647-903 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:51.083182+05:30
%A Aqeel Khalique
%A Kuldip Singh
%A Sandeep Sood
%T A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards
%J International Journal of Computer Applications
%@ 0975-8887
%V 2
%N 3
%P 26-30
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key techniques for its small key size and high security and is suitable for secure access of smart cards because implementation on smart cards is challenging due to memory, bandwidth, and computation constraints. In this paper, we proposed a password-authenticated key agreement scheme based on ECC. Our scheme provides more guarantees in security as follows: 1) the computation and communication cost is very low; 2) a user can freely choose and change his own password; 3) the privacy of users can be protected; 4) it generates a session key agreed upon by the user and the server; 5) it provides both implicit key and explicit key confirmation; and 6) it can prevent the offline dictionary attack even if the secret information stored in a smart card is compromised. And yet, our scheme is simpler and more efficient for smart card authentication.

References
  1. Lamport, L. 1981. Password authentication with insecure communication. Communication of the ACM. vol. 24, No. 11. 770-772.
  2. Mangipudi, K., Katti, R. 2006. A Hash based Strong Password Authentication Protocol with User Anonymity. International Journal of Network Security. vol. 2. No.3. 205-209
  3. Jena, D., Jena, S. K., Mohanty, D., Panigrahy, S. K. 2008. A Novel Remote User Authentication Scheme using Smart Card based on ECDLP. International Conference on Advanced Computer Control.
  4. Song, B., Kim, K. 2000. Two-Pass Authenticated Key Agreement Protocol with Key Confirmation. Progress in Cryptology. INDOCRYPT 2000. LNCS 1977, Springer-Verlag. 58-65.
  5. Wilson, S. B., Menezes, A. 1999. Authenticated Diffie-Hellman Key Agreement Protocols. Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC ’98). LNCS 1556, Springer-Verlag. 339-361.
  6. Menezes, A., Oorschot, P. V., Vanstone, S. 1997. Handbook of Applied Cryptography. CRC Press.
  7. Koblitz, N., 1987. Elliptic curve cryptosystems. Mathematics of Computation 48, 203-209.
  8. Miller, V., 1985. Use of elliptic curves in cryptography. CRYPTO 85.
  9. The Elliptic Curve Cryptosystem for Smart Cards. 1998. A Certicom White Paper.
  10. Li, F., Xin, X., Hu, Y. 2008. Identity-based broadcast signcryption. Computer Standard and Interfaces. vol 30. 89-94.
  11. Hankerson, D., Menezes, A., Vanstone, S., 2004. Guide to Elliptic Curve Cryptography. Springer.
  12. Juang, W. S., Chen, S. T., Liaw, H.T. 2008. Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards. IEEE Transactions on Industrial Electronics. vol. 55, No. 6.
Index Terms

Computer Science
Information Sciences

Keywords

Mutual authentication Elliptic curve cryptosystem Key exchange