Enhancing Security in Cryptographic Smart Cards through Elliptic Curve Cryptography and Optimized Modified Matrix Encoding Algorithms
نویسندگان
چکیده
Now-a-days Cryptographic smart cards are being used for most of the online transactions in many fields. But the security and the privacy of usage of these smart cards have been threatened by various attacks to hack the passwords of the smart card users. Since, small length passwords are easily accessible to hackers, users and organizations adapt to longer passwords or to change their passwords frequently. But the risk of having longer passwords or changing passwords frequently is that the passwords could be easily forgotten. Researchers have got this into their main concern and have worked on improving the security of these Cryptographic smart cards. They have employed several cryptographic techniques to embed the card holder details and the password into the smart card. However, those methods invented to improve the smart card security are not up to the requirements. In this work, we have designed a secure technique by integrating both Cryptography and Steganography which can be used for Smart Card Security. Initially, user’s confidential details are encrypted using the most secure Elliptic Curve Cryptography (ECC) technique and then the encrypted cipher is embedded into the users photographic image using a novel proposed steganographic technique named Optimized Modified Matrix Encoding (OMME) algorithm. While embedding the encrypted user details into the image of the user, in order to reduce distortion of stegoimage, an Optimization algorithm, Artificial Bee Colony (ABC) technique is used to select the image pixels where the secret data should be embedded. On the other end, the secret data embedded into users’ image is extracted and it is de-ciphered. If the match occurs, then user will be authenticated. This proposed technique increases the level of security and thus it can be used for the security of smartcards when compared to existing methodologies, since ECC is more secure than any other cryptographic algorithm and the modified matrix encoding using ABC algorithm embeds more number of message bits and simultaneously reduces distortion in stego image.
منابع مشابه
Data Security Analysis and Security Extension for Smart Cards Using Java Card
Smart cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Multifunction cards are used to manage network system access, store value and other data. The cards carry personal account, credit and buying-preference information and thus, security becomes a primary issue here. Public Key Cryptography plays an essential role in...
متن کاملResistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms used, one of the most serious threats against secret data stored in such devices is Side Channel Analysis. Implementing Public Key Cryptography in low-profile devices such as smart cards is particularly challenging given ...
متن کاملPower Analysis Attacks on ECC: A Major Security
Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem to be ideal for applications with small resources such a sensor network, smartcard, RFID, etc. How...
متن کاملA Small and Fast Software Implementation of Elliptic Curve Cryptosystems over GF (p) on a 16-Bit Microcomputer
Recently the study and implementation of elliptic curve cryptosystems (ECC) have developed rapidly and its achievements have become a center of attraction. ECC has the advantage of high-speed processing in software even on restricted environments such as smart cards. In this paper, we concentrate on complete software implementation of ECC over a prime field on a 16-bit microcomputer M16C (10MHz...
متن کاملEfficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN sche...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013