Abstract

In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design and efficient security scheme. In this paper, a smart card authentication protocol based on the concept of elliptic curve signcryption has been proposed and developed, which provides security attributes, including confidentiality of messages, non-repudiation, the integrity of messages, mutual authentication, anonymity, availability, and forward security. Moreover, the analysis of security functionalities shows that the protocol developed and explained in this paper is secure from password guessing attacks, user and server impersonation, replay attacks, de-synchronization attacks, insider attacks, known key attacks, and man-in-the-middle attacks. The results have demonstrated that the proposed smart card security protocol reduces the computational overhead on a smart card by 33.3% and the communication cost of a smart card by 34.5%, in comparison to the existing efficient protocols. It can, thus, be inferred from the results that using elliptic curve signcryption in the authentication mechanism reduces the computational cost and communication overhead by a significant amount.

Highlights

  • The computing environment has changed rapidly in the past two decades on account of technological advancements and innovations

  • Section focuses on the preliminaries used in developing the smart card security protocol

  • Zhao et al [7] performed a critical analysis of Truong et al.’s [29] approach and showed that it failed to resist password guessing attacks and the impersonation attacks. They proposed a smart card mutual authentication protocol on the basis of ECC, which removed the deficiencies in the protocol presented by Truong et al Chandrakar and Om [30] presented a two-factor scheme based on the Rabin Cryptosystem implementing an authentication mechanism and key agreement for remote users

Read more

Summary

Introduction

The computing environment has changed rapidly in the past two decades on account of technological advancements and innovations. Automatic identification and data capture are one of the most important components of process automation, and are used in a variety of applications. The technologies behind automatic identification and data capture include bar codes, chip cards, biometrics, voice recognition, optical character recognition, smart cards, magnetic stripes, and radio frequency identification (RFID). Among these technologies, smart cards are being used widely in many critical applications due to their advantages of longer life, larger memory, high security, and lesser cost of operations [1]. A CPU (central processing unit), ROM (read-only memory), a RAM (random access memory), a co-processor, and an electrically erasable programmable read-only memory (EEPROM) are the major components of.

Security Requirements for Smart Cards
Security Challenges of Smart Cards
Physical attempted on smart be refuted has been in Figure
Communication Scenario
Organization of Paper
Literature
Operations on Elliptic Curve
Computational Problems on Elliptic Curve
Elliptic Curve Signcryption
Initialization Phase
Signcryption Phase
Un-Signcryption Phase
Setup Phase
Registration Phase
Registration of the SVR with RGC
Registration of the USR with RGC
Signcryption Based Mutual Authentication Phase in ECSSP-SC
Password Update Phase
Proof of Correctness
Analysis of Security Attributes of ECSSP-SC
Confidentiality
Mutual Authentication
Integrity
Forward Security
Availability
Anonymity
Non-Repudiation
Analysis of Resistance Capability of ECSSP-SC against Attacks
Resistance to Replay Attacks
Resistance to Insider Attacks
Resistance to De-Synchronization Attacks
Resistance to Offline Password Guessing Attacks
Resistance to Known Key Attacks
Performance Analysis of the Proposed ECSSP-SC
Analysis of Computational Cost
Analysis of Communication Cost
Comparison of Security Attributes
Comparison of Resistance Capability against Attacks
Findings
Discussion
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call