Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices

被引:68
作者
Lee, Cheng-Chi [1 ,2 ]
Chen, Chi-Tung
Wu, Ping-Hsien [1 ,3 ]
Chen, Te-Yu [4 ]
机构
[1] Fu Jen Catholic Univ, Dept Lib & Informat Sci, New Taipei City 24205, Taiwan
[2] Asia Univ, Dept Photon & Commun Engn, Taichung 402, Taiwan
[3] Natl Chin Yi Univ Technol, Dept Distribut Management, Taichung 41170, Taiwan
[4] Natl Tainan Inst Nursing, Tainan 700, Taiwan
关键词
USER AUTHENTICATION SCHEME; MUTUAL AUTHENTICATION; REMOTE;
D O I
10.1049/iet-cdt.2012.0073
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes a three-factor control protocol for universal serial bus (USB) on an elliptic curve cryptosystem (ECC). USB is a universal interface used in an enormous number of devices. It has become the most popular interface standard for computer connections. However, since USB provides high transmission speed and is very convenient to carry, many workplace and commercial establishments have prohibited their employees from using USB devices. This precaution is an important way to prevent confidential data leaks via USB devices, as USB connections lack security management. Therefore the authors use a three-factor control protocol to ensure the security of USB connections. The proposed authentication protocol combines biometric, password and smart card to provide high security on the USB mutual authentication. To provide secure and efficient transmission between the user and the USB server, the proposed protocol adopts ECC to encrypt data. Compared to other encryption methods, the proposed protocol uses much smaller key sizes. As a further benefit, this protocol reduces the smart card computational cost and provides an efficient transmission for USB devices. This new scheme improves the security, efficiency and usability of the authentication process. More studies on USB are needed.
引用
收藏
页码:48 / 55
页数:8
相关论文
共 31 条
[1]  
Alzarouni M., 2006, P 4 AUSTR INF SEC C, P312
[2]  
[Anonymous], P IFIP INT C WIR OPT
[3]   Privacy preserving multi-factor authentication with biometrics [J].
Bhargav-Spantzel, Abhilasha ;
Squicciarini, Anna ;
Modi, Shimon ;
Young, Matthew ;
Bertino, Elisa ;
Elliott, Stephen .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) :529-560
[4]  
Choi SG, 2012, LECT NOTES COMPUT SC, V7194, P39, DOI 10.1007/978-3-642-28914-9_3
[5]  
Cortier V, 2007, LECT NOTES COMPUT SC, V4424, P538
[6]  
Dawson Ed., 2004, P IEEE INT C INF TEC, P274
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
Fabian M., 2007, P 4 ANN C INF SEC CU, P28
[9]   Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics [J].
Fan, Chun-I ;
Lin, Yi-Hui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) :933-945
[10]  
Gil Y., 2003, P 32 APPL IM PATT RE, P238