Secure Authentication and Document Signature with Cryptogram Smart Card in an Insecure Environment

نویسندگان

  • Peter Sweeney
  • Xiyu Shi
  • David R. B. Burgess
  • Alain Rhelimi
چکیده

This paper describes a mechanism for secure online user authentication and document signature with a cryptogram Java card in an insecure environment. The mechanism requires possession of both the card and some secrets, known as Concepts, to authenticate the user. The concepts are represented in image form. A method of secure document signing with the concept-based images is also outlined. Possible security weakness and attack methods are analysed in the paper. An implementation of the mechanism is also described in brief. It is anticipated that the mechanism would provide security and non-repudiation for e-Commerce customers in an insecure operating

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Cryptanalysis and An Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card pdfkeywords=Attack, Authentication, Password, Secure ID, Smart Card

Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...

متن کامل

An Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier Tables

Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...

متن کامل

Smart Card based Mobile Payment Protocol

New mobile consumers are demanding access to a wider range of applications and services, convenient payment for digital content and physical goods, and integrated financial management services. As mobile devices evolve into ‘smart devices’, the primary requirements for realizing the digital contents providing services are to implement the compatibly secure payment protocol on m-commerce environ...

متن کامل

An Improved Protocol for Password Authentication Using Smart Cards

In recent years, several password authentication schemes for remote login and verification have been widely implemented for systems that control and access to Internet applications. Therefore, how to assure the security protection of these related operations in computer networks has been extensively investigated by many engineers in these two decades. Recently, an advanced smart card based pass...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004