We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Novel Smart Card Authentication Scheme using Image Encryption

by Ravi Singh Pippal, Pradeep Gupta, Rakesh Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 9
Year of Publication: 2013
Authors: Ravi Singh Pippal, Pradeep Gupta, Rakesh Singh
10.5120/12520-8479

Ravi Singh Pippal, Pradeep Gupta, Rakesh Singh . A Novel Smart Card Authentication Scheme using Image Encryption. International Journal of Computer Applications. 72, 9 ( June 2013), 8-14. DOI=10.5120/12520-8479

@article{ 10.5120/12520-8479,
author = { Ravi Singh Pippal, Pradeep Gupta, Rakesh Singh },
title = { A Novel Smart Card Authentication Scheme using Image Encryption },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 9 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number9/12520-8479/ },
doi = { 10.5120/12520-8479 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:37:27.008968+05:30
%A Ravi Singh Pippal
%A Pradeep Gupta
%A Rakesh Singh
%T A Novel Smart Card Authentication Scheme using Image Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 9
%P 8-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

From the user point of view, security and efficiency are the two main factors for any authentication scheme. However, most of the smart card authentication schemes are vulnerable to one or the other possible attack. In this paper, highly secured smart card authentication scheme is proposed using image encryption that resists all the possible attacks and satisfies the needs of a user. Its security is based on encryption of text with a key image. Moreover, it provides mutual authentication, session key establishment and uses date and time as a timestamp to resist replay attack. Security analysis proves that the proposed scheme is more secure and practical.

References
  1. L. Lamport, "Password authentication with insecure communication", Communications of the ACM, vol. 24, no. 11, 1981, pp. 770-772.
  2. Tzong-Chen Wu, "Remote login authentication scheme based on a geometric approach", Computer Communications, vol. 18, no. 12, 1995, pp. 959-963.
  3. M. S. Hwang, "Cryptanalysis of a remote login authentication scheme", Computer Communications, vol. 22, no. 8, 1999, pp. 742-744.
  4. Wen-Her Yang and Shiuh-Pyng Shieh, "Password authentication schemes with smart cards", Computers & Security, vol. 18, no. 8, 1999, pp. 727-733.
  5. C. K. Chan and L. M. Cheng, "Cryptanalysis of timestamp-based password authentication scheme", Computer & Security, vol. 21, no. 1, 2002, pp. 74-76.
  6. M. S. Hwang and L. H. Li, "A new remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, vol. 46, no. 1, 2000, pp. 28-30.
  7. C. K. Chan and L. M. Cheng, "Cryptanalysis of a remote user authentication scheme using smart cards," IEEE Transactions on Consumer Electronics, vol. 46, no. 4, 2000, pp. 992-993.
  8. H. M. Sun, "An efficient remote user authentication scheme using smart cards", IEEE Transactions on Consumer Electronics, vol. 46, no. 4, 2000, pp. 958-961.
  9. Chien-Lung Hsu, "Security of two remote user authentication schemes using smart cards", IEEE Transactions on Consumer Electronics, vol. 49, no. 4, 2003, pp. 1196-1198.
  10. Hung-Yu Chien, Jinn-Ke Jan and Yuh-Min Tseng, "An efficient and practical solution to remote authentication: smart card", Computers & Security, vol. 21, no. 4, 2002, pp. 372-375.
  11. Wen-Shenq Juang, "Efficient password authenticated key agreement using smart cards", Computers & Security, vol. 23, no. 2, 2004, pp. 167-173.
  12. Manik Lal Das, Ashutosh Saxena, and Ved P. Gulati, "A Dynamic ID-based remote user authentication scheme", IEEE Transactions on Consumer Electronics, vol. 50, no. 2, 2004, pp. 629-631.
  13. I-En Liao, Cheng-Chi Lee and Min-Shiang Hwang, "Security enhancement for a dynamic ID-based remote user authentication scheme", International Conference on Next Generation Web Services Practices, 2005.
  14. Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao and Jing Dan, "A more efficient and secure dynamic ID-based remote user authentication scheme", Computer Communications, vol. 32, no. 4, 2009, pp. 583-585.
  15. Ronggong Song, "Advanced smart card based password authentication protocol", Computer Standards & Interfaces, vol. 32, no. 5-6, 2010, pp. 321-325.
  16. Ravi Singh Pippal, Jaidhar C. D. and Shashikala Tapaswi, "Comments on symmetric key encryption based smart card authentication scheme", 2nd International Conference on Computer Technology and Development (ICCTD-2010), November 2-4, 2010, Cairo, Egypt, pp. 482-484.
  17. C-T Li and M. S. Hwang, "An efficient biometrics-based remote user authentication scheme using smart cards", Journal of Network and Computer Applications, vol. 33, no. 1, 2010, pp. 1-5.
  18. Xiong Li, Jian-Wei Niu, Jian Ma, Wen-Dong Wang and Cheng-Lian Liu, "Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards", Journal of Network and Computer Applications, vol. 34, no. 1, 2011, pp. 73-79.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Image encryption Mutual authentication Password Replay attack Session key Smart card