Secure Encryption scheme with key exchange for Two server Architecture

11/29/2017
by   D Siva Santosh Kumar, et al.
0

In the distributed environment, authentication and key exchange mechanisms play a major role. In general, for authentication, the client and the server mutually exchange a common cryptographic key. In earlier, passwords were stored on a single server. If an intruder gains access to the server by using some malicious attacks, then all the passwords stored in the database be compromised. So the e-commerce application security is endangered. In order to improve the efficiency and performance of the authentication scheme, we introduce multiple servers to store the passwords and participate in the key exchange and authentication schemes. This ensures entire systems' security even if a single server is compromised. The randomly generated nonce for each session corresponding to two-level security mechanism where the scope of an attacker pretends as legitimate user and login to the system is completely restricted. In this method, passwords are stored in their equivalent hash values and stored on multiple servers. This makes the attacker difficult to reverse engineer and intercept to determine the password even from segments of hash value. In this paper, we model a safe and secure password-based authentication scheme using a key exchange.

READ FULL TEXT

page 1

page 2

page 3

research
04/19/2020

Secure and Energy-Efficient Key-Agreement Protocol for Multi-Server Architecture

Authentication schemes are practised globally to verify the legitimacy o...
research
07/29/2018

TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs

A physical unclonable function (PUF) generates hardware intrinsic volati...
research
11/30/2017

Efficacy of Object-Based Passwords for User Authentication

Traditional text-based password schemes are inherently weak. Users tend ...
research
01/20/2019

Ring Oscillator and its application as Physical Unclonable Function (PUF) for Password Management

Mobile and embedded devices are becoming inevitable parts of our daily r...
research
10/03/2021

Generating and Managing Strong Passwords using Hotel Mnemonic

Weak passwords and availability of supercomputers to password crackers m...
research
04/09/2020

The Blob: provable incompressibility and traceability in the whitebox model

We introduce a scheme for distributing and storing software with cryptog...
research
03/16/2020

Formal Methods Analysis of the Secure Remote Password Protocol

We analyze the Secure Remote Password (SRP) protocol for structural weak...

Please sign up or login with your details

Forgot password? Click here to reset