Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card

被引:5
|
作者
Meshram, Chandrashekhar [1 ]
Meshram, Sarita Gajbhiye [2 ]
Ibrahim, Rabha W. [3 ]
Jalab, Hamid A. [4 ]
Jamal, Sajjad Shaukat [5 ]
Barve, Sharad Kumar [2 ]
机构
[1] Coll Chhindwara Univ, Jaywanti Haksar Govt Postgrad Coll, Dept Post Grad Studies & Res Math, Betul 480001, India
[2] Water Resources & Appl Math Res Lab, Nagpur, Maharashtra, India
[3] IEEE 94086547, Kuala Lumpur 59200, Malaysia
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Multimedia Unit, Kuala Lumpur 50603, Malaysia
[5] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
关键词
Mutual authentication; Smart card; Session key; Conformable chaotic map; Fractional calculus; Conformable calculus; Perfect forward secrecy; Hash function; Cryptography; KEY-EXCHANGE; CRYPTANALYSIS; ANONYMITY; SECURITY;
D O I
10.1007/s40747-021-00555-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.
引用
收藏
页码:973 / 987
页数:15
相关论文
共 50 条
  • [41] Attacks and improvements to chaotic map-based RFID authentication protocol
    Akgun, Mete
    Bayrak, Ali Osman
    Caglayan, Mehmet Ufuk
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4028 - 4040
  • [42] Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture
    Wang, Huawei
    Guo, Dianli
    Wen, Qiaoyan
    Hua, Zhang
    IEEE ACCESS, 2019, 7 : 161340 - 161349
  • [43] Secure password-based remote user authentication scheme against smart card security breach
    Wang, Ding
    Ma, Chun-Guang
    Zhang, Qi-Ming
    Zhao, Sendong
    Journal of Networks, 2013, 8 (01) : 148 - 155
  • [44] A Modified Remote User Authentication Scheme using Smart Card based on ECDLP
    Jena, Debasish
    Panigrahy, Saroj Kumar
    Jena, Sanjay Kumar
    Pani, Subhendu Kumar
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, 2009, : 22 - +
  • [45] A Novel Remote User Authentication Scheme using Smart Card based on ECDLP
    Jena, Debasish
    Jena, Sanjay Kumar
    Mohanty, Debashisa
    Panigrahy, Saroj Kumar
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 246 - 249
  • [46] A Robust Remote User Authentication Scheme Using Smart Card
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 7 - 11
  • [48] Remote user authentication scheme using smart card: a review
    Karuppiah, Marimuthu
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (2-3) : 107 - 120
  • [49] Cryptanalysis of a Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme
    Quan, Chunyi
    Jung, Jaewook
    Lee, Hakjun
    Kang, Dongwoo
    Won, Dongho
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 438 - 441
  • [50] Cryptanalysis of a Sensor Smart Card Based Password Authentication Scheme with User Anonymity
    Cao, Tianjie
    Huang, Shi
    SENSOR LETTERS, 2013, 11 (11) : 2149 - 2151