Secure Authentication and Document Signature with Cryptogram Smart Card in an Insecure Environment
نویسندگان
چکیده
This paper describes a mechanism for secure online user authentication and document signature with a cryptogram Java card in an insecure environment. The mechanism requires possession of both the card and some secrets, known as Concepts, to authenticate the user. The concepts are represented in image form. A method of secure document signing with the concept-based images is also outlined. Possible security weakness and attack methods are analysed in the paper. An implementation of the mechanism is also described in brief. It is anticipated that the mechanism would provide security and non-repudiation for e-Commerce customers in an insecure operating
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملCryptanalysis and An Efficient Secure ID-Based Remote User Authentication Scheme Using Smart Card pdfkeywords=Attack, Authentication, Password, Secure ID, Smart Card
Remote User authentication protocol is used for verifying the legitimacy of a remote user over insecure network environments. Recently, many secure ID based remote user authentication scheme using smart card have been proposed in the literature. In 2012, Ratan-Sanjay [1] proposed secure ID based remote user authentication scheme using smart card and claimed that their scheme can avoid all types...
متن کاملAn Improvement of Efficient Dynamic ID-based User Authentication Scheme using Smart Cards without Verifier Tables
Remote user authentication scheme is one of the most convenient authentication schemes to deal with secret data over insecure channel. During the last couple of decades, many researchers have proposed a remote user authentication schemes which are ID-based, password-based, and smart card-based. Above all, smart card-based authentication schemes are becoming day by day more popular. One of the b...
متن کاملSmart Card based Mobile Payment Protocol
New mobile consumers are demanding access to a wider range of applications and services, convenient payment for digital content and physical goods, and integrated financial management services. As mobile devices evolve into ‘smart devices’, the primary requirements for realizing the digital contents providing services are to implement the compatibly secure payment protocol on m-commerce environ...
متن کاملAn Improved Protocol for Password Authentication Using Smart Cards
In recent years, several password authentication schemes for remote login and verification have been widely implemented for systems that control and access to Internet applications. Therefore, how to assure the security protection of these related operations in computer networks has been extensively investigated by many engineers in these two decades. Recently, an advanced smart card based pass...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004