Abstract
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward security. Moreover, the analysis of security functionalities shows that the protocol developed and explained in this paper is secure from password guessing attacks, user and server impersonation, replay attacks, de-synchronization attacks, insider attacks, known key attacks, and man-in-the-middle attacks. The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison to the existing efficient protocols. It can, thus, be inferred from the results that using elliptic curve signcryption in the authentication mechanism reduces the computational cost and communication overhead by a significant amount.
Highlights
The computing environment has changed rapidly in the past two decades on account of technological advancements and innovations
Section focuses on the preliminaries used in developing the smart card security protocol
Zhao et al [7] performed a critical analysis of Truong et al.’s [29] approach and showed that it failed to resist password guessing attacks and the impersonation attacks. They proposed a smart card mutual authentication protocol on the basis of ECC, which removed the deficiencies in the protocol presented by Truong et al Chandrakar and Om [30] presented a two-factor scheme based on the Rabin Cryptosystem implementing an authentication mechanism and key agreement for remote users
Summary
The computing environment has changed rapidly in the past two decades on account of technological advancements and innovations. Automatic identification and data capture are one of the most important components of process automation, and are used in a variety of applications. The technologies behind automatic identification and data capture include bar codes, chip cards, biometrics, voice recognition, optical character recognition, smart cards, magnetic stripes, and radio frequency identification (RFID). Among these technologies, smart cards are being used widely in many critical applications due to their advantages of longer life, larger memory, high security, and lesser cost of operations [1]. A CPU (central processing unit), ROM (read-only memory), a RAM (random access memory), a co-processor, and an electrically erasable programmable read-only memory (EEPROM) are the major components of.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have