Smart card based password authentication and user anonymity scheme using ECC and steganography

Vineeta Singh, Priyanka Dahiya, Sanjay Singh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this information age, providing security over the Internet is a major issue. Internet security is all about trust at a remote distance, because we are dealing with everyone remotely and not able to confirm identity or authenticity in the traditional sense. To increase the password authentication a scheme was proposed by Chun-Ta Li which is basically a smart card-based password authentication and update scheme. The Chun's scheme provides user anonymity and eviction of unauthorized users. In our research work we have crypt analyze the Chun's method and shown that it is vulnerable to various types of attacks: insider attack, off line password verifier attack, stolen verifier attack and impersonating attack. To overcome the security vulnerability of Chun's scheme, we have proposed an advance scheme of password authentication and user anonymity using Elliptic Curve Cryptography (ECC) and stegnography. The proposed scheme also provides privacy to the client. Based on scheme performance criteria such as immunity to known attacks and functional features, we came to the conclusion that the proposed scheme is much efficient and solves several hard security threats.

Original languageEnglish
Title of host publicationProceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1614-1621
Number of pages8
ISBN (Electronic)9781479930791
DOIs
Publication statusPublished - 01-01-2014
Event3rd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014 - Delhi, India
Duration: 24-09-201427-09-2014

Conference

Conference3rd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014
CountryIndia
CityDelhi
Period24-09-1427-09-14

Fingerprint

Steganography
Smart cards
Authentication
Cryptography
Internet

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Cite this

Singh, V., Dahiya, P., & Singh, S. (2014). Smart card based password authentication and user anonymity scheme using ECC and steganography. In Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014 (pp. 1614-1621). [6968403] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICACCI.2014.6968403
Singh, Vineeta ; Dahiya, Priyanka ; Singh, Sanjay. / Smart card based password authentication and user anonymity scheme using ECC and steganography. Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 1614-1621
@inproceedings{f9bd3edda3674addb713295977d000f2,
title = "Smart card based password authentication and user anonymity scheme using ECC and steganography",
abstract = "In this information age, providing security over the Internet is a major issue. Internet security is all about trust at a remote distance, because we are dealing with everyone remotely and not able to confirm identity or authenticity in the traditional sense. To increase the password authentication a scheme was proposed by Chun-Ta Li which is basically a smart card-based password authentication and update scheme. The Chun's scheme provides user anonymity and eviction of unauthorized users. In our research work we have crypt analyze the Chun's method and shown that it is vulnerable to various types of attacks: insider attack, off line password verifier attack, stolen verifier attack and impersonating attack. To overcome the security vulnerability of Chun's scheme, we have proposed an advance scheme of password authentication and user anonymity using Elliptic Curve Cryptography (ECC) and stegnography. The proposed scheme also provides privacy to the client. Based on scheme performance criteria such as immunity to known attacks and functional features, we came to the conclusion that the proposed scheme is much efficient and solves several hard security threats.",
author = "Vineeta Singh and Priyanka Dahiya and Sanjay Singh",
year = "2014",
month = "1",
day = "1",
doi = "10.1109/ICACCI.2014.6968403",
language = "English",
pages = "1614--1621",
booktitle = "Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

Singh, V, Dahiya, P & Singh, S 2014, Smart card based password authentication and user anonymity scheme using ECC and steganography. in Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014., 6968403, Institute of Electrical and Electronics Engineers Inc., pp. 1614-1621, 3rd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014, Delhi, India, 24-09-14. https://doi.org/10.1109/ICACCI.2014.6968403

Smart card based password authentication and user anonymity scheme using ECC and steganography. / Singh, Vineeta; Dahiya, Priyanka; Singh, Sanjay.

Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 1614-1621 6968403.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Smart card based password authentication and user anonymity scheme using ECC and steganography

AU - Singh, Vineeta

AU - Dahiya, Priyanka

AU - Singh, Sanjay

PY - 2014/1/1

Y1 - 2014/1/1

N2 - In this information age, providing security over the Internet is a major issue. Internet security is all about trust at a remote distance, because we are dealing with everyone remotely and not able to confirm identity or authenticity in the traditional sense. To increase the password authentication a scheme was proposed by Chun-Ta Li which is basically a smart card-based password authentication and update scheme. The Chun's scheme provides user anonymity and eviction of unauthorized users. In our research work we have crypt analyze the Chun's method and shown that it is vulnerable to various types of attacks: insider attack, off line password verifier attack, stolen verifier attack and impersonating attack. To overcome the security vulnerability of Chun's scheme, we have proposed an advance scheme of password authentication and user anonymity using Elliptic Curve Cryptography (ECC) and stegnography. The proposed scheme also provides privacy to the client. Based on scheme performance criteria such as immunity to known attacks and functional features, we came to the conclusion that the proposed scheme is much efficient and solves several hard security threats.

AB - In this information age, providing security over the Internet is a major issue. Internet security is all about trust at a remote distance, because we are dealing with everyone remotely and not able to confirm identity or authenticity in the traditional sense. To increase the password authentication a scheme was proposed by Chun-Ta Li which is basically a smart card-based password authentication and update scheme. The Chun's scheme provides user anonymity and eviction of unauthorized users. In our research work we have crypt analyze the Chun's method and shown that it is vulnerable to various types of attacks: insider attack, off line password verifier attack, stolen verifier attack and impersonating attack. To overcome the security vulnerability of Chun's scheme, we have proposed an advance scheme of password authentication and user anonymity using Elliptic Curve Cryptography (ECC) and stegnography. The proposed scheme also provides privacy to the client. Based on scheme performance criteria such as immunity to known attacks and functional features, we came to the conclusion that the proposed scheme is much efficient and solves several hard security threats.

UR - http://www.scopus.com/inward/record.url?scp=84927626375&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84927626375&partnerID=8YFLogxK

U2 - 10.1109/ICACCI.2014.6968403

DO - 10.1109/ICACCI.2014.6968403

M3 - Conference contribution

SP - 1614

EP - 1621

BT - Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Singh V, Dahiya P, Singh S. Smart card based password authentication and user anonymity scheme using ECC and steganography. In Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 1614-1621. 6968403 https://doi.org/10.1109/ICACCI.2014.6968403