We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Symmetric Two-Server Password based Authentication and Key Exchange Protocol Deployed in PaaS

Published on July 2015 by Anitha Kumari K, Sudha Sadasivam G, Rohini L
International Conference on Innovations in Computing Techniques (ICICT 2015)
Foundation of Computer Science USA
ICICT2015 - Number 2
July 2015
Authors: Anitha Kumari K, Sudha Sadasivam G, Rohini L
6e9049b1-64e2-4ce7-82d4-fa9dbd482e8a

Anitha Kumari K, Sudha Sadasivam G, Rohini L . A Symmetric Two-Server Password based Authentication and Key Exchange Protocol Deployed in PaaS. International Conference on Innovations in Computing Techniques (ICICT 2015). ICICT2015, 2 (July 2015), 1-7.

@article{
author = { Anitha Kumari K, Sudha Sadasivam G, Rohini L },
title = { A Symmetric Two-Server Password based Authentication and Key Exchange Protocol Deployed in PaaS },
journal = { International Conference on Innovations in Computing Techniques (ICICT 2015) },
issue_date = { July 2015 },
volume = { ICICT2015 },
number = { 2 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 1-7 },
numpages = 7,
url = { /proceedings/icict2015/number2/21460-1473/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Innovations in Computing Techniques (ICICT 2015)
%A Anitha Kumari K
%A Sudha Sadasivam G
%A Rohini L
%T A Symmetric Two-Server Password based Authentication and Key Exchange Protocol Deployed in PaaS
%J International Conference on Innovations in Computing Techniques (ICICT 2015)
%@ 0975-8887
%V ICICT2015
%N 2
%P 1-7
%D 2015
%I International Journal of Computer Applications
Abstract

In real time applications, more number of servers and data centers are needed for fast processing in the required time and to provide high level of security in communication due to rapid growth of data. Password Authenticated Key Exchange (PAKE) protocol is used to verify the authentication of the communicating parties and then secret key is generated based on their passwords. Mostly in single server environment the users share a password with a trusted single server. If the single server is compromised, then the environment is prone to many attacks such as online dictionary attacks, server spoofing attack and stolen verification attacks. The proposed system is built based on ElGamal encryption scheme and Diffie-Hellman Key Exchange algorithm in the two-server password based authentication and key exchange protocol. Discrete logarithm in f*p is used in ElGamal encryption to provide additional security. Discrete logarithm problem would render the ElGamal cryptosystem, secure against the man in the middle attack and other cryptographic attacks. The proposed scheme is provided with additional security and also its resistance against attacks.

References
  1. Xun Yi. , and San Ling, Huaxiomg, "Efficient Two-Server Password Only Authenticated Key Exchange", IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 9, pp. 1773- 1782, 2013.
  2. Hung-Yu Chien. , and Tzong-Chen Wu, Ming- KueiYeh, "Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks",Journal Of Information Science And Engineering, Vol. 29, No. 2, pp. 249-265, 2013.
  3. Yanjiang Yang. , and Deng R. H, FengBao, "A Practical Password-Based Two-Server Authentication and Key Exchange System", IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 2, pp. 105-114, 2006.
  4. Jun Ho Lee. , and Dong Hoon Lee, "Secure and Efficient Password-Based Authenticated Key Exchange Protocol for Two-Server Architecture", International Conference on Convergence Information Technology, 2007, Vol. 21, No. 23, pp. 2102-2107, 2007.
  5. Dexin Yang. , and Bo Yang, "A Novel Two-Server Password Authentication Scheme with Provable Security", IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 1605-1609, 2010.
  6. Her-TyanYeh. , and Hung-Min Sun, "Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attack", ACM SIGOPS Operating Systems Review, Vol. 36, No. 4, pp. 14-22, 2002.
  7. Anamika Chouskey. , and YogadharPandey, "An Efficient Password Based Two-Server Authentication and Pre-shared Key Exchange System using Smart Cards", International Journal of Computer Science and Information Technologies,Vol. 4, No. 1, pp. 117-120, 2013.
  8. Katz J. , and MacKenzie P, Taban G, Gligor V, "Two-server password-only authenticated key exchange", Proc. ACNS'05, pp. 1-16, 2009.
  9. Lishan Kang, Xuejie Zhang(2010), "Identity - Based Authentication in Grid Storage Sharing", 2010 International Conference on Multimedia Information Networking and Security.
  10. Dinesha H A, Agrawal V K, "Multi-Dimensional Password Generation Technique for Accessing Cloud Services", International Journal on Cloud Computing: Services and Architecture, 2012, Vol. 2, No. 3. pp. 31.
  11. Bhavana A, Alekhya V, Deepak K, and Sreenivas V, "Password Authentication System (PAS) for Cloud Environment", International Journal of Advanced Computer Science and Information Technology, 2013, Volume 2, pp. 29-33.
Index Terms

Computer Science
Information Sciences

Keywords

Password Authenticated Key Exchange Two-server Diffie-hellman Key Exchange.