SlideShare a Scribd company logo
1 of 8
Download to read offline
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
Password-Authenticated Key Exchange
Scheme Using Chaotic Maps towards a New
Architecture in Standard Model
UMASHREE HUDEDA, SHAMSHAD DODDAMANI, JYOTHI K J,
SUDHARANI S, POORNIMA D
STJIT, Ranibenur VT University, INDIA
Abstract
Nowadays, the overwhelming majority of password-authenticated key agreement protocols using
chaotic maps are based on three architectures (client/server, two clients/server and multi-server)
and four security models (heuristic security, random oracle, ideal cipher and standard model).
However, with rapid changes in the modern communication environment such as wireless mesh
networks and cloud storing, it is necessary to put forward a kind more flexible and general
architecture to adapt it. So, in our paper, we firstly propose a provable secure password
authenticated key agreement protocol using chaotic maps towards multiple servers to server
architecture in the standard model. The multiple servers to server architecture will solve the
problems single-point of security, single-point of efficiency and single-point of failure in the
centralized registration center towards multi-server architecture. The new protocol resists
dictionary attacks mounted by either passive or active network intruders, allowing, in principle,
even weak password phrases to be used safely. It also offers perfect forward secrecy, which
protects past sessions and passwords against future compromises. Finally, we give the security
proof in the standard model and the efficiency analysis of our proposed scheme.
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
Motivation behind choosing the project
Chaos theory used to cryptography. Chaotic system is extremely sensitive to initial parameters,
unpredictability, blondeness, etc. chaotic sequence generated by chaotic system has the
properties of non-periodicity and pseudo-randomness. Chaos theory and chaotic system have
exploited a new way for cryptography. Cryptographic primitive, key agreement protocol allows
two or more parties to agree on shared keys which will be used to protect their later
communication. Then, combining chaos theory and key agreement primitive, many authenticated
key exchange (AKE) protocols. One-way authenticated key agreement scheme (OWAKE) based
on chaotic maps with multi-server architecture. The OWAKE scheme is widely used to no need
for mutual authentication environment on Internet, such as readers-to-journalists model and
patient-to-expert model. The chaotic maps, multiple servers to server architecture (MSTSA) to
solve the problems caused by centralized architecture, such as multi-server architecture with the
registration center (RC). Multi-server authenticated key agreement (MSAKA) architecture is
more popular among the AKE protocols.
Proposed System:
In Proposed System multiple servers to server architecture, in registered process each users
interacts with the particular servers. When clients interact with the server give the high security
process from the server via mail alerts and generate the security key for the server interaction.
Client representing use System IP Authentication.
Password-authenticated key agreement method is an interactive method for two or more clients
to establish cryptographic keys based on one or more servers.
Symmetric Encryption using for Randomized Key Generation process.
Objectives:
Multiple servers to server:
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
Multiple servers to server architecture (MSTSA) to solve the problems caused by centralized
architecture, such as multi-server architecture with the registration center (RC). The core ideas of
the proposed scheme are the symmetry (or called peer to peer) in the server side and the
transparency for the client side. In brief, based on chaotic maps, there were many AKE protocols
from functionality aspect, or from efficiency aspect, or from security aspect, for from
architecture aspect to improve the AKE protocols. Multi-server authenticated key agreement
(MSAKA) architecture is more popular among the AKE protocols which aim to register at the
registration center for log in other servers without register repeatedly. MSAKA protocols mainly
want to solve the problems in a traditional single server with authentication schemes which lead
to the fact that user has to register to different servers separately.
Chaos theory:
Chaos theory is the behavior of dynamical systems that are highly sensitive to initial conditions.
Small differences in initial conditions (such as those due to rounding errors in numerical
computation) yield widely diverging outcomes for such dynamical systems, rendering long-term
prediction impossible in general. This happens even though these systems are deterministic,
meaning that their future behavior is fully determined by their initial conditions, with
no random elements involved. In other words, the deterministic nature of these systems does not
make them predictable. Chaos theory and chaotic system have exploited a new way for
cryptography. Cryptographic primitive, key agreement protocol allows two or more parties to
agree on shared keys which will be used to protect their later communication.
Mutual authentication
Mutual authentication or two-way authentication refers to two parties authenticating each other
at the same time. In technology terms, it refers to a client or user authenticating themselves to a
server and that server authenticating itself to the user in such a way that both parties are assured
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
of the others' identity. When describing online authentication processes, mutual authentication is
often referred to as website-to-user authentication, or site-to-user authentication. Typically, this
is done for a client process and a server process without user interaction. Mutual authentication is
typically used only when extra level of security is needed, especially in financial transactions
between organizations.
Literature Survey:
In [1] proposed “Cryptography with chaos" chaos-based cryptographic algorithms use dynamical
systems defined on the set of real numbers, and therefore are difficult for practical realization
and circuit implementation. Chaos-based cryptography, attracting many researchers in the past
decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and
cryptography. It Chaos' properties, such as randomness and periodicity, have been proved to be
suitable for designing the means for data protection. Properties in chaotic systems
and cryptographic primitives share unique characteristics that allow for the chaotic systems to be
applied to cryptography. If chaotic parameters as well as cryptographic keys can be mapped
symmetrically or mapped to produce acceptable and functional outputs, it will make it next to
impossible for an adversary to find the outputs without any knowledge the initial values.
In [2] Jin Wook Byun and Ik Rae Jeong implements “Password-Authenticated Key Exchange
between Clients with Different Passwords” Most password-authenticated key exchange
schemes in the literature provide an authenticated key exchange between a client and a server
based on a pre-shared password. With a rapid change in modern communication environments, it
is necessary to construct a secure end-to-end channel between clients, which is a quite different
paradigm from the existing ones. In this paper we propose a new framework which provides a
password-authenticated key exchange between clients based only on their two different
passwords without any pre-shared secret, so called Client-to-Client Pas sword-Authenticated Key
Exchange (C2C-PAKE). Security notions and types of possible attacks are newly defined
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 5 | P a g e Copyright@IDL-2017
according to the new framework. We prove our scheme is secure against all types of attacks
considered in the paper. Two secure C2C-PAKE schemes are suggested, one in a cross-realm
setting and the other in a single-server setting.
In [3] Jin Wook Byun implements “EC2C-PAKA: An efficient client-to-client password-
authenticated key agreement” Most password-authenticated key agreement schemes described in
the literature have focused on authenticated key agreement using a shared password between a
client and a server. With rapid changes in the modern communication environment such as ad
hoc networks and ubiquitous computing, it is necessary to construct a secure end-to-end channel
between clients. This paradigm is a quite different paradigm from the existing ones. Client-to-
client password-authenticated key agreement (C2C-PAKA) enabling two clients in different
realms to agree on a common session key using different passwords. Byun et al. first presented
a C2C-PAKA protocol under the cross-realm setting. However, the scheme was not formally
treated, and subsequently found to be flawed. In addition, in this scheme, there is still
opportunity for improvements both in the computation and communication aspects. We provide
formal treatments for the C2C-PAKA protocol by using Bellare et al.’s security model. We also
suggest an efficientC2C-PAKA protocol and prove that the protocol is secure under the
decisional Diffie–Hellman assumption in the ideal cipher and random oracle models.
In [5] proposed A Weakness of the Password-authenticated Key Agreement between Clients
with Different Passwords Scheme, A password-authenticated key exchange scheme allows two
entities, who only share a memorable password, to authenticate each other and to agree on a
cryptographic session key. Instead of considering it in the classic client and server scenarios,
Byun et al. recently proposed a password-authenticated key exchange protocol in a cross-realm
setting where two clients in different
realms obtain a secret session key as well as mutual authentication, with the help of respective
servers. we first point out that the proposed protocol is not secure, due to the choice of invalid
parameters (say, subgroup generator).Furthermore, we show in detail that, even with properly
chosen parameters, the protocol has still some secure flaws. We provide three attacks to illustrate
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 6 | P a g e Copyright@IDL-2017
the insecurity of the protocol. Finally, countermeasures are also given, which are believed able to
withstand our attacks.
In [21] “A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem,"
Nowadays chaos theory is widely used in cryptography. In the real world, in order to ensure
secure communication, many chaotic maps-based key agreement protocols have been proposed.
Most of them used a smart card on account of the inherent ability of anti-interference. Popularly,
many related protocols using smart card are used for a single server environment. However,
existing single server authentication protocols more or less have some defects. For a single
server environment, if a remote user feels like using a number of network services, it is so
complicated and boring to repeatedly register a new identity and password. To address this
problem, numerous multi-server authentication schemes have been proposed. However, these
existing proposed schemes pay attention to efficiency to ignore confidentiality, or focus on the
message integrity to ignore efficiency. In our proposed paper, we propose a robust biometrics
based multi-server password-authenticated key agreement scheme on chaotic maps
cryptosystem. In terms of the analysis of the security and functionality, the proposed scheme has
a mass of merits, for instance, prefect forward secrecy, session key secrecy, robust biometrics
authentication, password update secrecy, mutual authentication and key agreement. In addition,
the proposed scheme can resist common attacks such as guessing attack, replay attack, man-in-
the-middle attack and so on. In terms of the efficiency analysis, the proposed scheme is more
practical.
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 7 | P a g e Copyright@IDL-2017
Developer System Requirements
Software:
Language used: Java
Frame Work : Java Swings and AWT Frame
Data Base : MySQL
Communication: For Server => Wireless
For Client => Wireless/LAN/MAN
Cloud: Google Private Cloud (Capacity Max. 1GB)
Connectivity: Java Data Base Connector
IDL - International Digital Library ISSN: IDL
Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org
IDL - International Digital Library 8 | P a g e Copyright@IDL-2017
Development Tool: NetBeans IDE 8.0.2
Hardware:
Server: Hard Disk min 10GB
RAM min. 1 GB
OS: Any Windows / XP version
Communication: Wireless
Client: Hard Disk min 10GB
RAM min. 1 GB
OS: Any Windows / UNIX / Linux
Communication: Wireless/LAN/MAN/WAN

More Related Content

What's hot

Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd Iaetsd
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computingijsptm
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionPvrtechnologies Nellore
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibcLokesh Gopu
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modiMohit Modi
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3Mohammad Asif
 
Blockchin architecture & use cases -part-2
Blockchin architecture & use cases -part-2Blockchin architecture & use cases -part-2
Blockchin architecture & use cases -part-2Mohammad Asif
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
 
Blockchin architecture azure meetup
Blockchin architecture azure meetupBlockchin architecture azure meetup
Blockchin architecture azure meetupMohammad Asif
 
Identity based proxy-oriented data uploading and
Identity based proxy-oriented data uploading andIdentity based proxy-oriented data uploading and
Identity based proxy-oriented data uploading andKamal Spring
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsGokul Alex
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusCMR WORLD TECH
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiesINFOGAIN PUBLICATION
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...LeMeniz Infotech
 
Identity based distributed provable data possession in multicloud storage
Identity based distributed provable data possession in multicloud storageIdentity based distributed provable data possession in multicloud storage
Identity based distributed provable data possession in multicloud storageieeepondy
 
77201924
7720192477201924
77201924IJRAT
 

What's hot (20)

Iaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security withIaetsd a survey on cloud storage security with
Iaetsd a survey on cloud storage security with
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Distributed private key generator in ibc
Distributed private key generator in ibcDistributed private key generator in ibc
Distributed private key generator in ibc
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3Blockchin Architecture on Azure-Part-3
Blockchin Architecture on Azure-Part-3
 
Blockchin architecture & use cases -part-2
Blockchin architecture & use cases -part-2Blockchin architecture & use cases -part-2
Blockchin architecture & use cases -part-2
 
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONSECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
 
Blockchin architecture azure meetup
Blockchin architecture azure meetupBlockchin architecture azure meetup
Blockchin architecture azure meetup
 
Identity based proxy-oriented data uploading and
Identity based proxy-oriented data uploading andIdentity based proxy-oriented data uploading and
Identity based proxy-oriented data uploading and
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Blockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and AlgorithmsBlockchain Scalability - Architectures and Algorithms
Blockchain Scalability - Architectures and Algorithms
 
Hyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensusHyperledger arch wg_paper_1_consensus
Hyperledger arch wg_paper_1_consensus
 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Identity based distributed provable data possession in multicloud storage
Identity based distributed provable data possession in multicloud storageIdentity based distributed provable data possession in multicloud storage
Identity based distributed provable data possession in multicloud storage
 
77201924
7720192477201924
77201924
 

Similar to MSTSA-PAKE - Multiple Servers to Server Architecture for Password-Authenticated Key Exchange Using Chaotic Maps

Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
 
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...IJMTST Journal
 
Lightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnLightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnCSEIJJournal
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...
IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...
IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...IRJET Journal
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageMugesh Mukkandan
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET Journal
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computingINFOGAIN PUBLICATION
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...IJECEIAES
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsIRJET Journal
 

Similar to MSTSA-PAKE - Multiple Servers to Server Architecture for Password-Authenticated Key Exchange Using Chaotic Maps (20)

Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
 
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
 
Lightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnLightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement Protocoln
 
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...
IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...
IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN CLOUD COM...
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
 
Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...Mutual query data sharing protocol for public key encryption through chosen-c...
Mutual query data sharing protocol for public key encryption through chosen-c...
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
 
50120130406006
5012013040600650120130406006
50120130406006
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
 
Reshma.docx
Reshma.docxReshma.docx
Reshma.docx
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Kerberos Security in Distributed Systems
Kerberos Security in Distributed SystemsKerberos Security in Distributed Systems
Kerberos Security in Distributed Systems
 
El35782786
El35782786El35782786
El35782786
 

Recently uploaded

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

MSTSA-PAKE - Multiple Servers to Server Architecture for Password-Authenticated Key Exchange Using Chaotic Maps

  • 1. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 1 | P a g e Copyright@IDL-2017 Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model UMASHREE HUDEDA, SHAMSHAD DODDAMANI, JYOTHI K J, SUDHARANI S, POORNIMA D STJIT, Ranibenur VT University, INDIA Abstract Nowadays, the overwhelming majority of password-authenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four security models (heuristic security, random oracle, ideal cipher and standard model). However, with rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. So, in our paper, we firstly propose a provable secure password authenticated key agreement protocol using chaotic maps towards multiple servers to server architecture in the standard model. The multiple servers to server architecture will solve the problems single-point of security, single-point of efficiency and single-point of failure in the centralized registration center towards multi-server architecture. The new protocol resists dictionary attacks mounted by either passive or active network intruders, allowing, in principle, even weak password phrases to be used safely. It also offers perfect forward secrecy, which protects past sessions and passwords against future compromises. Finally, we give the security proof in the standard model and the efficiency analysis of our proposed scheme.
  • 2. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 2 | P a g e Copyright@IDL-2017 Motivation behind choosing the project Chaos theory used to cryptography. Chaotic system is extremely sensitive to initial parameters, unpredictability, blondeness, etc. chaotic sequence generated by chaotic system has the properties of non-periodicity and pseudo-randomness. Chaos theory and chaotic system have exploited a new way for cryptography. Cryptographic primitive, key agreement protocol allows two or more parties to agree on shared keys which will be used to protect their later communication. Then, combining chaos theory and key agreement primitive, many authenticated key exchange (AKE) protocols. One-way authenticated key agreement scheme (OWAKE) based on chaotic maps with multi-server architecture. The OWAKE scheme is widely used to no need for mutual authentication environment on Internet, such as readers-to-journalists model and patient-to-expert model. The chaotic maps, multiple servers to server architecture (MSTSA) to solve the problems caused by centralized architecture, such as multi-server architecture with the registration center (RC). Multi-server authenticated key agreement (MSAKA) architecture is more popular among the AKE protocols. Proposed System: In Proposed System multiple servers to server architecture, in registered process each users interacts with the particular servers. When clients interact with the server give the high security process from the server via mail alerts and generate the security key for the server interaction. Client representing use System IP Authentication. Password-authenticated key agreement method is an interactive method for two or more clients to establish cryptographic keys based on one or more servers. Symmetric Encryption using for Randomized Key Generation process. Objectives: Multiple servers to server:
  • 3. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 3 | P a g e Copyright@IDL-2017 Multiple servers to server architecture (MSTSA) to solve the problems caused by centralized architecture, such as multi-server architecture with the registration center (RC). The core ideas of the proposed scheme are the symmetry (or called peer to peer) in the server side and the transparency for the client side. In brief, based on chaotic maps, there were many AKE protocols from functionality aspect, or from efficiency aspect, or from security aspect, for from architecture aspect to improve the AKE protocols. Multi-server authenticated key agreement (MSAKA) architecture is more popular among the AKE protocols which aim to register at the registration center for log in other servers without register repeatedly. MSAKA protocols mainly want to solve the problems in a traditional single server with authentication schemes which lead to the fact that user has to register to different servers separately. Chaos theory: Chaos theory is the behavior of dynamical systems that are highly sensitive to initial conditions. Small differences in initial conditions (such as those due to rounding errors in numerical computation) yield widely diverging outcomes for such dynamical systems, rendering long-term prediction impossible in general. This happens even though these systems are deterministic, meaning that their future behavior is fully determined by their initial conditions, with no random elements involved. In other words, the deterministic nature of these systems does not make them predictable. Chaos theory and chaotic system have exploited a new way for cryptography. Cryptographic primitive, key agreement protocol allows two or more parties to agree on shared keys which will be used to protect their later communication. Mutual authentication Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time. In technology terms, it refers to a client or user authenticating themselves to a server and that server authenticating itself to the user in such a way that both parties are assured
  • 4. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 4 | P a g e Copyright@IDL-2017 of the others' identity. When describing online authentication processes, mutual authentication is often referred to as website-to-user authentication, or site-to-user authentication. Typically, this is done for a client process and a server process without user interaction. Mutual authentication is typically used only when extra level of security is needed, especially in financial transactions between organizations. Literature Survey: In [1] proposed “Cryptography with chaos" chaos-based cryptographic algorithms use dynamical systems defined on the set of real numbers, and therefore are difficult for practical realization and circuit implementation. Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography. It Chaos' properties, such as randomness and periodicity, have been proved to be suitable for designing the means for data protection. Properties in chaotic systems and cryptographic primitives share unique characteristics that allow for the chaotic systems to be applied to cryptography. If chaotic parameters as well as cryptographic keys can be mapped symmetrically or mapped to produce acceptable and functional outputs, it will make it next to impossible for an adversary to find the outputs without any knowledge the initial values. In [2] Jin Wook Byun and Ik Rae Jeong implements “Password-Authenticated Key Exchange between Clients with Different Passwords” Most password-authenticated key exchange schemes in the literature provide an authenticated key exchange between a client and a server based on a pre-shared password. With a rapid change in modern communication environments, it is necessary to construct a secure end-to-end channel between clients, which is a quite different paradigm from the existing ones. In this paper we propose a new framework which provides a password-authenticated key exchange between clients based only on their two different passwords without any pre-shared secret, so called Client-to-Client Pas sword-Authenticated Key Exchange (C2C-PAKE). Security notions and types of possible attacks are newly defined
  • 5. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 5 | P a g e Copyright@IDL-2017 according to the new framework. We prove our scheme is secure against all types of attacks considered in the paper. Two secure C2C-PAKE schemes are suggested, one in a cross-realm setting and the other in a single-server setting. In [3] Jin Wook Byun implements “EC2C-PAKA: An efficient client-to-client password- authenticated key agreement” Most password-authenticated key agreement schemes described in the literature have focused on authenticated key agreement using a shared password between a client and a server. With rapid changes in the modern communication environment such as ad hoc networks and ubiquitous computing, it is necessary to construct a secure end-to-end channel between clients. This paradigm is a quite different paradigm from the existing ones. Client-to- client password-authenticated key agreement (C2C-PAKA) enabling two clients in different realms to agree on a common session key using different passwords. Byun et al. first presented a C2C-PAKA protocol under the cross-realm setting. However, the scheme was not formally treated, and subsequently found to be flawed. In addition, in this scheme, there is still opportunity for improvements both in the computation and communication aspects. We provide formal treatments for the C2C-PAKA protocol by using Bellare et al.’s security model. We also suggest an efficientC2C-PAKA protocol and prove that the protocol is secure under the decisional Diffie–Hellman assumption in the ideal cipher and random oracle models. In [5] proposed A Weakness of the Password-authenticated Key Agreement between Clients with Different Passwords Scheme, A password-authenticated key exchange scheme allows two entities, who only share a memorable password, to authenticate each other and to agree on a cryptographic session key. Instead of considering it in the classic client and server scenarios, Byun et al. recently proposed a password-authenticated key exchange protocol in a cross-realm setting where two clients in different realms obtain a secret session key as well as mutual authentication, with the help of respective servers. we first point out that the proposed protocol is not secure, due to the choice of invalid parameters (say, subgroup generator).Furthermore, we show in detail that, even with properly chosen parameters, the protocol has still some secure flaws. We provide three attacks to illustrate
  • 6. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 6 | P a g e Copyright@IDL-2017 the insecurity of the protocol. Finally, countermeasures are also given, which are believed able to withstand our attacks. In [21] “A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem," Nowadays chaos theory is widely used in cryptography. In the real world, in order to ensure secure communication, many chaotic maps-based key agreement protocols have been proposed. Most of them used a smart card on account of the inherent ability of anti-interference. Popularly, many related protocols using smart card are used for a single server environment. However, existing single server authentication protocols more or less have some defects. For a single server environment, if a remote user feels like using a number of network services, it is so complicated and boring to repeatedly register a new identity and password. To address this problem, numerous multi-server authentication schemes have been proposed. However, these existing proposed schemes pay attention to efficiency to ignore confidentiality, or focus on the message integrity to ignore efficiency. In our proposed paper, we propose a robust biometrics based multi-server password-authenticated key agreement scheme on chaotic maps cryptosystem. In terms of the analysis of the security and functionality, the proposed scheme has a mass of merits, for instance, prefect forward secrecy, session key secrecy, robust biometrics authentication, password update secrecy, mutual authentication and key agreement. In addition, the proposed scheme can resist common attacks such as guessing attack, replay attack, man-in- the-middle attack and so on. In terms of the efficiency analysis, the proposed scheme is more practical.
  • 7. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 7 | P a g e Copyright@IDL-2017 Developer System Requirements Software: Language used: Java Frame Work : Java Swings and AWT Frame Data Base : MySQL Communication: For Server => Wireless For Client => Wireless/LAN/MAN Cloud: Google Private Cloud (Capacity Max. 1GB) Connectivity: Java Data Base Connector
  • 8. IDL - International Digital Library ISSN: IDL Volume 1, Issue 1, FEB-2017 Available at: www.dbpuplications.org IDL - International Digital Library 8 | P a g e Copyright@IDL-2017 Development Tool: NetBeans IDE 8.0.2 Hardware: Server: Hard Disk min 10GB RAM min. 1 GB OS: Any Windows / XP version Communication: Wireless Client: Hard Disk min 10GB RAM min. 1 GB OS: Any Windows / UNIX / Linux Communication: Wireless/LAN/MAN/WAN