SlideShare a Scribd company logo
1 of 4
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 120
A PERFORMANCE COMPARISON OF PROPOSED APPROACH OF
MULTISERVER AUTHENTICATION AND KEY AGREEMENT WITH
USER PROTECTION WITH JAUNG APPROACH
Amita Jangid1, Vishal Shrivastawa2
1
M.Tech Scholar, Department of CSE, Arya College of Engineering & Information Technology SP-42 RIICO
Industrial Area Kukas, Jaipur Rajasthan, India
2
Professor,Department of CSE, Arya College of Engineering & Information Technology SP-42 RIICO Industrial Area
Kukas, Jaipur Rajasthan, India
Abstract
Use of smart card makes remote user verification and key agreement easy, elastic to making a secure scattered system
environment. It is very important to provide user privacy protection in authentication phase. In this paper, we are describing the
performance comparison of Jung approach for multiple server authentication and key agreement schemes with user protection in
network security with our proposed approach. First we are describing the jaung approach then overview of our approach with
comparison. All the areas those can be improved by us are also defined. Our approach is works for single server as well as multi
sever environment. According to our analysis the jaung approach is open to the element, leak-of-verifier attack and session key
discovery attack and smart card loss attack. We are saving data into the server table in form of digital identity, smart card is
removed by us, and so the new approach is safe from smart card loss attack.
Keywords: User Verification, Session Key, Comparison, Key Size, Smart Card, Network Security.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The user must login to access the services provided by the
server. For login usersend his username and password to the
server through a protected path. In this case for to check the
authenticity of the user sever reads the message send by the
user and verifies his identity and password, if the identity
and password matches then server gives rights to access all
services provided by itself otherwise user not allowed to
access the services. In previous paper we study the Jaung
approach for multi server authentication and key agreement
problem and we figure out its limitation and improvement
areas. So in this paper we shall describe the overview of our
proposed approach and comparison of performance with
Jung approach. Jaung scheme is efficient for authentication
and key agreement but the drawback of the scheme; it has
no ability of anonymity for the user. we can make it more
secure and cost effective. The following points must be
considered for user authentication and key conformity
phase.
a. Confidentiality shelter: In the phase of authentication
the opponent can not constrain the identity of the user.
b. Generously choose password: All uses are free to
change password and select his password by himself.
c. Less communication and computation cost: The smart
card is costly and it is not offers a powerful computation
capability so we are removing the smart card from our
approach.
d. Mutual authentication: Server authenticate user
mutually.
e. Session key contract: Each server and user must
establish a session before communication [7, 8].
Usually in all scheme each user needs to register many
servers and memorize more than one identities and
passwords. This is not convenient way for the users. To
make it easy to use many approaches are proposed for multi
server authentication. In these entire new schemes only one
time login works for many severs. User need not to register
on all the servers. These are the following criteria for
security of the session key generation phase.
a. Session key safety: Session key must be shared with
the user and server only securely
b. Forward confidentiality: Session key must have some
time out feature. The long driven session key is
unsecure that is used before for other sessions. For each
new session new key must be generate.
c. Known-key security: The old session key can not
determine the new session key.
2. STUDY OF JUNG APPROACH
Junag approach is smart card based approach for remote
logins to multi server environment. This approach is weak
beside smart card lost problems, leak-of-verifier attack. To
remove all recognized security terrorization in their
mechanism, we shall propose an improved version this
approach.
Notation used in Juang algorithm “A → B: C” denote A is
sender B is message and C is receiver, E y(c) denote that
secure key y is used to encrypt the chipper text c. D y(m)
denote the secrete key y is used to decrypt the plaintext m
corresponding symmetric cryptosystem[13], “||” denote the
string concatenate operator and ® denote the bitwise
exclusive-or operator. h denote the hash function.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 121
2.1 Juang Approach for Single Sever
Authentication
Jaung scheme is based on the smart card which is describing
below this scheme is for user authentication and key
agreement with high communication cost and more
functions. [8]
Following notations are used here. Ui stands for ith user. IDi
stands for unique identity of user. x is the secrete key. S
stands for server. PW is the password for a user login.
2.1.1 Registration Phase
User sends a message to the server of his identity IDi and
password PW for registration [8] If sever accepts his request
than below steps are processed:
Step 1: Sever generate secrete keys for user ui vi = h(IDi||x)
and wi = vi ® PWi.
Step 2: In this step IDi and wi is loaded into the memory of
smart card. That card issue to the user.
2.1.2 Login and Session Key Agreement Phase
User first attaches his smart card to the device then submits
his id and password to the reader device. Both server and
user choose nonce value N1 and N2 for fresh login check
step. For generate the session key a random number rsk
chosen by server and ruk chosen by user then the session
key is generated ki = h(rsk||ruk||vi). Then below steps are
processed for it login:
Step 1: Ui → S: N1, IDi,Evi (rui, h(IDi|| N1));
Step 2: S → Ui: Evi (rs,N1 + 1,N2);
Step 3: Ui→ S: Eki (N2 + 1).
2.2 Multi Server Authentication Scheme
This scheme is proposed by Jaung for multi server
authentication and key agreement which is based on smart
card. Users, servers and a registration centre are the
participants of this scheme. It is assumed that the
registration centre is trusted. In this scheme user has to
register only one time to access the different services
provided by the different servers. Let RC stands for the
registration centre, Sj denote server j, and Ui denote user i.
Let UIDi be a unique identification of user i and SIDj stands
for unique identity of server Sj. X is assume to be a secrete
token kept by registration center securely. Registration
center generates the secret key wj = h(x||SIDj) that is shared
with registered servers securely. This key further used in
communication.
2.2.1 Registration Phase
User sends a message to registration center RC sever which
message conations user identity UIDi and user password
PWi. Below steps are performed by the registration center
for ith user registration.
Step 1: RC generates the two secret keys for user i one is vi
=h(x||UIDi) and other is μi = vi ® PWi.
Step 2: Then user identity and μi is loaded to the memory
of smart card than that is useful for the user. That card is
issue to the user.
Step 3: For establish communication between each user and
server RC generates a shared secret key which is shared
between users and severs. The key is vi,j = h(vi||SIDj). And
then RC sends encrypted key Ewj (vi,j ,UIDi) to each sever
after receiving this encrypted key, severs saves this key into
its database.
2.2.2 Login and Session Key Agreement Phase
User first attaches his smart card to the device then submits
his id and password to the reader device. Both server and
user choose nonce value N1 and N2 for fresh login check
step. For generate the session key a random number rsk
chosen by server and ruk chosen by user then the session
key is generated ki = h(rsk||ruk||vi). Then below steps are
processed for it login:
Step 1: Ui → Sj : N1,UIDi,Evi,j (ruk, h(UIDi||N1));
Step 2: Sj → Ui : Evi,j (rsk,N1 + 1,N2);
Step 3: Ui → Sj : Eskk (N2 + 1).
2.2.3 Shared Key Inquiry Phase
As we have seen in step 3 of registration phase of multi
sever environment RC sends a encrypted key Ewj (vi,j
,UIDi) to each sever that key is saved by all severs
databases, so for removing the efforts to save that key on
each server we can verify this key from registration center
only. It can be fetch directly from the RC. So the below
steps can be processed between step 1 and step 2 of login
and session key agreement phase when it requires the shared
key [10].
Step 1: Sj → RC : N3,UIDi, SIDj ;
Step 2: Ewj (vi,j ,N3 + 1).
2.3 limitation of Juang scheme
These are some drawbacks of this scheme it does not
provide the user secrecy functionality and it is not function
properly for multi server environments. Juang’s scheme
lacks efficiency, and each server needs to additionally
protect and securely maintain an encrypted key table.
According to my analysis the key size is very large. The
output block size of secure key can reduce. This can be
more secure by using other cryptographic functions.
3. OVERVIEW OF OUR PROPOSED
APPROACH
First we shall define the improvements we can do in the
above scheme. Following are the improvements those we
have consider in our proposed scheme.
a. The secure key size can be reducing by using the other
cryptographic technique.
b. We are using 3DES in place of hash function which is
more secure and required the less block size. So
security is another factor that we shall improve.
c. We can make only one time registration to login to
multiple sever. By using a single digital identity and
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 122
password user can access the multiple services provided
by the different severs.
d. We are removing smart card in our proposed scheme so
the user is saved from smart card loss attack. We are
storing the user’s login details in sever in formof digital
identity securely.
e. Cost and time consumption can be reduce.
These are the area we can improve in our approach. Now
let’s discuss the overview of our proposed approach.
4. PROPOSED APPROACH
We proposed an improved version of Jaung user
authentication and key agreement scheme that is more
efficient, less computational, more secure and required less
memory block size. This proposed scheme is suitable for
single server and multi server environment. Our scheme also
has low communication and computation cost for user
authentication by only using symmetric crypto systems
using 3DES which more secure technique. Also, this new
scheme successfully solves the user protection and security
problem in a multiple sever system since our proposed
scheme is based on 3DES. Description of proposed
improvements in Jaung user authentication and key
agreement scheme. In place of one simple hash function we
are using 3DES which is more secure and required less
memory block size. It provides addition security and control
over user.
It is an efficient approach for user authentication and key
agreement with controlled security attacks using 3DES
algorithm. The same approach used for single server will be
use to build an efficient multiple servers system. The keys
generated by the sever for each user is saved on sever in
digital identity form. The user login to user by entering its
digital identity which is securely sent to the user. If the
identity is correct server allows users to login to sever
otherwise not.
In case of multiple server environment the registration
center manages all severs and users. A key distribution
centre, service providers (servers) and users are the
participants of this protocol.
The registration center compute the secrete key and send
that key to each sever after register at registration center.
That key is generated using highly secure 3DES algorithm
which less in size in comparison of Junag scheme and more
secure. This key is also saved on registration Center. Each
sever also save the same key in tables securely.
To login the user must register on registration center user
enter its identity and password. The sever generates its
secure key using 3DES algorithm and sends that key to the
each sever to verify the users identity when the same user
will login to registered server. After successful registration
the user can login to sever. User chooses a nonce value and
server also chooses a nonce value for freshness checking.
Then user enter its details sever checks his identity by
applying some secure encryption decryption techniques. If
the details matches with the digital identity stored by the
server then user gets successful login otherwise not ale to
login the sever.
This is the overview of our proposed approach we shall
describe the detail of each steps of our approach for single
server as well as multiserver environment. The algorithm
steps we shall describe in our next paper.
5. COMPARISONS OF PERFORMANCE
ANALYSIS
We estimate the competence of our scheme and Juang’s
scheme. Juang’s scheme is based on the hash function, and
our scheme is based on the 3DES cryptosystem so the
performance of our approach is better than Jaung approach.
In our scheme secrete key length is less than Jaung scheme.
For compute the computation cost of registration phase we
can see the Jaung approach [8], needs only one hash
function and in our scheme one 3DES function needed that
makes secrete keys more secure and less memory size
required. The computation cost is base on the aggregation
of encryption and decryption operations. Our approach
requires four encryptions and four decryptions in login
phase. In Jaung approach [8], only three encryptions, four
decryptions and five hash functions needed. We have
removed the smart card also saving all the data on sever in
form of digital signatures securely which is cost effective
and safe from smart card loss attack.
6. CONCLUSION
In this paper, we have discussed the improvements done in
jaung approach and overview of our proposed approach for
multiple server and single server user authentication and
session key establishment. In our approach only one time
registration required to access the mutilpe services provided
by the servers. Our approach is more secure required less
cost and ease of use. This new approch also have low
communication and Computation cost for user
authentication by only using 3DES algorithm. It also solves
the serious time-synchronization problem in a multi server
environment. Our scheme required less memory size. Less
cost because smart card is removed in our approach so we
are safe from smart card loss attack.
FUTURE WORK
We will provide the implementation of each step of our new
approach. In this paper we have only discuss the overview
of our approach. It is an improved version of Juang
approach which is more secure. That approach will take less
memory to store the user secrete keys and less
computational work require. It will store the user login
information securely in server tables in form of digital
identity by doing this smart card loss problem can be
removed.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 123
REFERENCES
[1]. S. Bellovin and M. Merritt, “Encrypted key exchange:
Password-based protocols secure against dictionary attacks,”
in Proceedings of IEEE Symposium on Research in Security
and Privacy, pp. 72-84, 1992.
[2]. M. Burrows, M. Abadi, and R. Needham, “A Logic of
Authentication,” ACM Transactions on Computer Systems,
vol. 8, no. 1, pp. 18-36, 1990.
[3]. Y. Chang and C. Chang, “Authentication schemes with
no verification table,” Applied Mathematics and
Computation, vol. 167, pp. 820-832, 2005.
[4]. W. Diffie and M. Hellman, “New directions in
cryptography,” IEEE Transactions on Information Theory,
vol. IT-22, no. 6, pp. 644-654, 1976.
[5]. C. Fan, Y. Chan, and Z. Zhang, “Robust remote
authentication scheme with smart cards,” Computers &
Security, vol. 24, pp. 619-628, 2005.
[6]. M. Hwang, C. Lee, and Y. Tang, “A simple remote user
authenticationscheme,” Mathematical and Computer
Modelling, vol. 36, pp. 103-107,2002.
[7]. T. Hwang and W. Ku, “Repairable key distribution
protocols forinternet environments,” IEEE Transactions on
Communications, vol. 43, no.5, pp. 1947-1950, 1995.
[8]. W. Juang, “Efficient password authenticated key
agreement using smart cards,” Computers & Security, vol.
23, no. 2, pp. 167-173, 2004.
[9]. W. Juang, “Efficient multi-server password
authenticated key agreement using smart cards,” IEEE
Transactions on Consumer Electronics,vol. 50, no.1, pp.
251-255, 2004.
[10]. W. Juang and W. Nien, “Efficient password
authenticated keyagreement using bilinear pairings,” in the
16th Information SecurityConference, pp. 214-
221,Taichung, Taiwan, June 2006.
[11]. L. Lamport, “Password authentication with insecure
communication,”Communications of the ACM, vol. 24, pp.
770-772, 1981.
[12]. A. Lenstra, E. Tromer, A. Shamir, W. Kortsmit,
B.Dodson, J. Hughes,and P. Leyland, “Factoring estimates
for a 1024-bit RSA modulus,” in Advances in Cryptology
(Asiacrypt’03), LNCS 2894, pp. 55-74, Springer,New York,
2003.
[13]. I. Lin, M. Hwang, and L. Li, “A new remote user
authenticationscheme for multi-server architecture,” Future
Generation ComputerSystems, vol. 19, pp.13-22, 2003.

More Related Content

What's hot

IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET Journal
 
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesCSCJournals
 
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"idsecconf
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDijcisjournal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...TELKOMNIKA JOURNAL
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer securityDeepak John
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET Journal
 
Msk security non linear authenticaiton
Msk security   non linear authenticaitonMsk security   non linear authenticaiton
Msk security non linear authenticaitonmsksecurity
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET Journal
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
IRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 

What's hot (19)

IRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using PassmatrixIRJET - Image Authentication System using Passmatrix
IRJET - Image Authentication System using Passmatrix
 
Cryptography
CryptographyCryptography
Cryptography
 
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
 
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
 
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARDPRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
PRIVACY PRESERVING USER AUTHENTICATION SCHEME BASED ON SMART CARD
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer security
 
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing AttacksIRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
IRJET-PASSMATRIX- An Authentication System to Resist Shoulder Surfing Attacks
 
Msk security non linear authenticaiton
Msk security   non linear authenticaitonMsk security   non linear authenticaiton
Msk security non linear authenticaiton
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
Advanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networksAdvanced mechanism for single sign on for distributed computer networks
Advanced mechanism for single sign on for distributed computer networks
 
EAC Proposal V2 032016 2125
EAC Proposal V2 032016 2125EAC Proposal V2 032016 2125
EAC Proposal V2 032016 2125
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
IRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed EnvironmentIRJET- Secure Kerberos System in Distributed Environment
IRJET- Secure Kerberos System in Distributed Environment
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 

Similar to A performance comparison of proposed approach of multiserver authentication and key agreement with user protection with jaung approach

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user AuthenticationIRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...IJNSA Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET Journal
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...ijctcm
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 

Similar to A performance comparison of proposed approach of multiserver authentication and key agreement with user protection with jaung approach (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
IRJET- Keystroke Dynamics for user Authentication
IRJET-  	  Keystroke Dynamics for user AuthenticationIRJET-  	  Keystroke Dynamics for user Authentication
IRJET- Keystroke Dynamics for user Authentication
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME WITH ...
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
 
IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
Distributed banking system using rmi project
Distributed banking system using rmi projectDistributed banking system using rmi project
Distributed banking system using rmi project
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
2007
20072007
2007
 
H364752
H364752H364752
H364752
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

A performance comparison of proposed approach of multiserver authentication and key agreement with user protection with jaung approach

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 120 A PERFORMANCE COMPARISON OF PROPOSED APPROACH OF MULTISERVER AUTHENTICATION AND KEY AGREEMENT WITH USER PROTECTION WITH JAUNG APPROACH Amita Jangid1, Vishal Shrivastawa2 1 M.Tech Scholar, Department of CSE, Arya College of Engineering & Information Technology SP-42 RIICO Industrial Area Kukas, Jaipur Rajasthan, India 2 Professor,Department of CSE, Arya College of Engineering & Information Technology SP-42 RIICO Industrial Area Kukas, Jaipur Rajasthan, India Abstract Use of smart card makes remote user verification and key agreement easy, elastic to making a secure scattered system environment. It is very important to provide user privacy protection in authentication phase. In this paper, we are describing the performance comparison of Jung approach for multiple server authentication and key agreement schemes with user protection in network security with our proposed approach. First we are describing the jaung approach then overview of our approach with comparison. All the areas those can be improved by us are also defined. Our approach is works for single server as well as multi sever environment. According to our analysis the jaung approach is open to the element, leak-of-verifier attack and session key discovery attack and smart card loss attack. We are saving data into the server table in form of digital identity, smart card is removed by us, and so the new approach is safe from smart card loss attack. Keywords: User Verification, Session Key, Comparison, Key Size, Smart Card, Network Security. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION The user must login to access the services provided by the server. For login usersend his username and password to the server through a protected path. In this case for to check the authenticity of the user sever reads the message send by the user and verifies his identity and password, if the identity and password matches then server gives rights to access all services provided by itself otherwise user not allowed to access the services. In previous paper we study the Jaung approach for multi server authentication and key agreement problem and we figure out its limitation and improvement areas. So in this paper we shall describe the overview of our proposed approach and comparison of performance with Jung approach. Jaung scheme is efficient for authentication and key agreement but the drawback of the scheme; it has no ability of anonymity for the user. we can make it more secure and cost effective. The following points must be considered for user authentication and key conformity phase. a. Confidentiality shelter: In the phase of authentication the opponent can not constrain the identity of the user. b. Generously choose password: All uses are free to change password and select his password by himself. c. Less communication and computation cost: The smart card is costly and it is not offers a powerful computation capability so we are removing the smart card from our approach. d. Mutual authentication: Server authenticate user mutually. e. Session key contract: Each server and user must establish a session before communication [7, 8]. Usually in all scheme each user needs to register many servers and memorize more than one identities and passwords. This is not convenient way for the users. To make it easy to use many approaches are proposed for multi server authentication. In these entire new schemes only one time login works for many severs. User need not to register on all the servers. These are the following criteria for security of the session key generation phase. a. Session key safety: Session key must be shared with the user and server only securely b. Forward confidentiality: Session key must have some time out feature. The long driven session key is unsecure that is used before for other sessions. For each new session new key must be generate. c. Known-key security: The old session key can not determine the new session key. 2. STUDY OF JUNG APPROACH Junag approach is smart card based approach for remote logins to multi server environment. This approach is weak beside smart card lost problems, leak-of-verifier attack. To remove all recognized security terrorization in their mechanism, we shall propose an improved version this approach. Notation used in Juang algorithm “A → B: C” denote A is sender B is message and C is receiver, E y(c) denote that secure key y is used to encrypt the chipper text c. D y(m) denote the secrete key y is used to decrypt the plaintext m corresponding symmetric cryptosystem[13], “||” denote the string concatenate operator and ® denote the bitwise exclusive-or operator. h denote the hash function.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 121 2.1 Juang Approach for Single Sever Authentication Jaung scheme is based on the smart card which is describing below this scheme is for user authentication and key agreement with high communication cost and more functions. [8] Following notations are used here. Ui stands for ith user. IDi stands for unique identity of user. x is the secrete key. S stands for server. PW is the password for a user login. 2.1.1 Registration Phase User sends a message to the server of his identity IDi and password PW for registration [8] If sever accepts his request than below steps are processed: Step 1: Sever generate secrete keys for user ui vi = h(IDi||x) and wi = vi ® PWi. Step 2: In this step IDi and wi is loaded into the memory of smart card. That card issue to the user. 2.1.2 Login and Session Key Agreement Phase User first attaches his smart card to the device then submits his id and password to the reader device. Both server and user choose nonce value N1 and N2 for fresh login check step. For generate the session key a random number rsk chosen by server and ruk chosen by user then the session key is generated ki = h(rsk||ruk||vi). Then below steps are processed for it login: Step 1: Ui → S: N1, IDi,Evi (rui, h(IDi|| N1)); Step 2: S → Ui: Evi (rs,N1 + 1,N2); Step 3: Ui→ S: Eki (N2 + 1). 2.2 Multi Server Authentication Scheme This scheme is proposed by Jaung for multi server authentication and key agreement which is based on smart card. Users, servers and a registration centre are the participants of this scheme. It is assumed that the registration centre is trusted. In this scheme user has to register only one time to access the different services provided by the different servers. Let RC stands for the registration centre, Sj denote server j, and Ui denote user i. Let UIDi be a unique identification of user i and SIDj stands for unique identity of server Sj. X is assume to be a secrete token kept by registration center securely. Registration center generates the secret key wj = h(x||SIDj) that is shared with registered servers securely. This key further used in communication. 2.2.1 Registration Phase User sends a message to registration center RC sever which message conations user identity UIDi and user password PWi. Below steps are performed by the registration center for ith user registration. Step 1: RC generates the two secret keys for user i one is vi =h(x||UIDi) and other is μi = vi ® PWi. Step 2: Then user identity and μi is loaded to the memory of smart card than that is useful for the user. That card is issue to the user. Step 3: For establish communication between each user and server RC generates a shared secret key which is shared between users and severs. The key is vi,j = h(vi||SIDj). And then RC sends encrypted key Ewj (vi,j ,UIDi) to each sever after receiving this encrypted key, severs saves this key into its database. 2.2.2 Login and Session Key Agreement Phase User first attaches his smart card to the device then submits his id and password to the reader device. Both server and user choose nonce value N1 and N2 for fresh login check step. For generate the session key a random number rsk chosen by server and ruk chosen by user then the session key is generated ki = h(rsk||ruk||vi). Then below steps are processed for it login: Step 1: Ui → Sj : N1,UIDi,Evi,j (ruk, h(UIDi||N1)); Step 2: Sj → Ui : Evi,j (rsk,N1 + 1,N2); Step 3: Ui → Sj : Eskk (N2 + 1). 2.2.3 Shared Key Inquiry Phase As we have seen in step 3 of registration phase of multi sever environment RC sends a encrypted key Ewj (vi,j ,UIDi) to each sever that key is saved by all severs databases, so for removing the efforts to save that key on each server we can verify this key from registration center only. It can be fetch directly from the RC. So the below steps can be processed between step 1 and step 2 of login and session key agreement phase when it requires the shared key [10]. Step 1: Sj → RC : N3,UIDi, SIDj ; Step 2: Ewj (vi,j ,N3 + 1). 2.3 limitation of Juang scheme These are some drawbacks of this scheme it does not provide the user secrecy functionality and it is not function properly for multi server environments. Juang’s scheme lacks efficiency, and each server needs to additionally protect and securely maintain an encrypted key table. According to my analysis the key size is very large. The output block size of secure key can reduce. This can be more secure by using other cryptographic functions. 3. OVERVIEW OF OUR PROPOSED APPROACH First we shall define the improvements we can do in the above scheme. Following are the improvements those we have consider in our proposed scheme. a. The secure key size can be reducing by using the other cryptographic technique. b. We are using 3DES in place of hash function which is more secure and required the less block size. So security is another factor that we shall improve. c. We can make only one time registration to login to multiple sever. By using a single digital identity and
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 122 password user can access the multiple services provided by the different severs. d. We are removing smart card in our proposed scheme so the user is saved from smart card loss attack. We are storing the user’s login details in sever in formof digital identity securely. e. Cost and time consumption can be reduce. These are the area we can improve in our approach. Now let’s discuss the overview of our proposed approach. 4. PROPOSED APPROACH We proposed an improved version of Jaung user authentication and key agreement scheme that is more efficient, less computational, more secure and required less memory block size. This proposed scheme is suitable for single server and multi server environment. Our scheme also has low communication and computation cost for user authentication by only using symmetric crypto systems using 3DES which more secure technique. Also, this new scheme successfully solves the user protection and security problem in a multiple sever system since our proposed scheme is based on 3DES. Description of proposed improvements in Jaung user authentication and key agreement scheme. In place of one simple hash function we are using 3DES which is more secure and required less memory block size. It provides addition security and control over user. It is an efficient approach for user authentication and key agreement with controlled security attacks using 3DES algorithm. The same approach used for single server will be use to build an efficient multiple servers system. The keys generated by the sever for each user is saved on sever in digital identity form. The user login to user by entering its digital identity which is securely sent to the user. If the identity is correct server allows users to login to sever otherwise not. In case of multiple server environment the registration center manages all severs and users. A key distribution centre, service providers (servers) and users are the participants of this protocol. The registration center compute the secrete key and send that key to each sever after register at registration center. That key is generated using highly secure 3DES algorithm which less in size in comparison of Junag scheme and more secure. This key is also saved on registration Center. Each sever also save the same key in tables securely. To login the user must register on registration center user enter its identity and password. The sever generates its secure key using 3DES algorithm and sends that key to the each sever to verify the users identity when the same user will login to registered server. After successful registration the user can login to sever. User chooses a nonce value and server also chooses a nonce value for freshness checking. Then user enter its details sever checks his identity by applying some secure encryption decryption techniques. If the details matches with the digital identity stored by the server then user gets successful login otherwise not ale to login the sever. This is the overview of our proposed approach we shall describe the detail of each steps of our approach for single server as well as multiserver environment. The algorithm steps we shall describe in our next paper. 5. COMPARISONS OF PERFORMANCE ANALYSIS We estimate the competence of our scheme and Juang’s scheme. Juang’s scheme is based on the hash function, and our scheme is based on the 3DES cryptosystem so the performance of our approach is better than Jaung approach. In our scheme secrete key length is less than Jaung scheme. For compute the computation cost of registration phase we can see the Jaung approach [8], needs only one hash function and in our scheme one 3DES function needed that makes secrete keys more secure and less memory size required. The computation cost is base on the aggregation of encryption and decryption operations. Our approach requires four encryptions and four decryptions in login phase. In Jaung approach [8], only three encryptions, four decryptions and five hash functions needed. We have removed the smart card also saving all the data on sever in form of digital signatures securely which is cost effective and safe from smart card loss attack. 6. CONCLUSION In this paper, we have discussed the improvements done in jaung approach and overview of our proposed approach for multiple server and single server user authentication and session key establishment. In our approach only one time registration required to access the mutilpe services provided by the servers. Our approach is more secure required less cost and ease of use. This new approch also have low communication and Computation cost for user authentication by only using 3DES algorithm. It also solves the serious time-synchronization problem in a multi server environment. Our scheme required less memory size. Less cost because smart card is removed in our approach so we are safe from smart card loss attack. FUTURE WORK We will provide the implementation of each step of our new approach. In this paper we have only discuss the overview of our approach. It is an improved version of Juang approach which is more secure. That approach will take less memory to store the user secrete keys and less computational work require. It will store the user login information securely in server tables in form of digital identity by doing this smart card loss problem can be removed.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 05 Issue: 08 | Aug-2016, Available @ http://ijret.esatjournals.org 123 REFERENCES [1]. S. Bellovin and M. Merritt, “Encrypted key exchange: Password-based protocols secure against dictionary attacks,” in Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992. [2]. M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36, 1990. [3]. Y. Chang and C. Chang, “Authentication schemes with no verification table,” Applied Mathematics and Computation, vol. 167, pp. 820-832, 2005. [4]. W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976. [5]. C. Fan, Y. Chan, and Z. Zhang, “Robust remote authentication scheme with smart cards,” Computers & Security, vol. 24, pp. 619-628, 2005. [6]. M. Hwang, C. Lee, and Y. Tang, “A simple remote user authenticationscheme,” Mathematical and Computer Modelling, vol. 36, pp. 103-107,2002. [7]. T. Hwang and W. Ku, “Repairable key distribution protocols forinternet environments,” IEEE Transactions on Communications, vol. 43, no.5, pp. 1947-1950, 1995. [8]. W. Juang, “Efficient password authenticated key agreement using smart cards,” Computers & Security, vol. 23, no. 2, pp. 167-173, 2004. [9]. W. Juang, “Efficient multi-server password authenticated key agreement using smart cards,” IEEE Transactions on Consumer Electronics,vol. 50, no.1, pp. 251-255, 2004. [10]. W. Juang and W. Nien, “Efficient password authenticated keyagreement using bilinear pairings,” in the 16th Information SecurityConference, pp. 214- 221,Taichung, Taiwan, June 2006. [11]. L. Lamport, “Password authentication with insecure communication,”Communications of the ACM, vol. 24, pp. 770-772, 1981. [12]. A. Lenstra, E. Tromer, A. Shamir, W. Kortsmit, B.Dodson, J. Hughes,and P. Leyland, “Factoring estimates for a 1024-bit RSA modulus,” in Advances in Cryptology (Asiacrypt’03), LNCS 2894, pp. 55-74, Springer,New York, 2003. [13]. I. Lin, M. Hwang, and L. Li, “A new remote user authenticationscheme for multi-server architecture,” Future Generation ComputerSystems, vol. 19, pp.13-22, 2003.