Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card
Tóm tắt
With the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.
Tài liệu tham khảo
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1:6–21
Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Solit Fract 39(3):1283–1289
Hwu F (1993) The interpolating random spline cryptosystem and the chaotic-map public-key cryptosystem. Ph.D. thesis, University of Missouri Rolla
ElGmal T (1995) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472
Chen BL, Kuo WC, Wu LC (2014) Robust smartcard-based remote user password authentication scheme. Int J Commun Syst 27:377–389
Ma CG, Wang D, Zhao SD (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215–2227
Xu J, Zhu WT, Feng DG (2009) An improved smartcard-based password authentication scheme with provable security. Comput Stand Interfaces 31(4):723–728
Song R (2010) Advanced smartcard-based password authentication protocol. Comput Stand Interfaces 32(5):321–325
Song R, Korba L, Yee G (2007) Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 International Conference on Security and Management. Las Vegas, USA, pp 323–329
Sood SK, Sarje AK, Singh K (2010) An improvement of Xu et al.’s authentication scheme using smartcards. In: Proceedings of the Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India, pp 17–25
Joye M, Olivier F (2010) Side-channel analysis, encyclopedia of cryptography and security. Kluwer Academic Publishers Springer, Berlin, pp 571–576
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of Advances in Cryptology (Crypto’99), LNCS. Springer Berlin Heidelberg, pp 388–397
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smartcard based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371
Islam SKH (2016) Design and analysis of an improved smartcard–based remote user password authentication scheme. Int J Commun Syst 29(11):1708–1719
Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel Pers Commun 89(2):569–597
Luo M, Zhang Y, Khan MK, He D (2017) An efficient chaos-based two-party key agreement protocol with provable security. Int J Commun Syst 30(14):e3288
Li CT, Chen CL, Lee CC, Weng CY, Chen CM (2018) A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput 22:2495–2506
Zhao Y, Li S, Jiang L, Liu T (2019) Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps. Int J Distrib Sens Netw 15(4):1–12
Dharminder D, Gupta P (2019) Security analysis and application of Chebyshev Chaotic map in the authentication protocols. Int J Comput Appl. https://doi.org/10.1080/1206212X.2019.1682238
Mishra D, Kumar V, Dharminder D, Rana S (2020) SFVCC: chaotic map-based security framework for vehicular cloud computing. IET Intel Transp Syst 14(4):241–249
Meshram C, Ibrahim RW, Deng L, Shende SW, Meshram SG, Barve SK (2021) A Robust smart card and remote user password-based authentication protocol using extended chaotic-maps under smart cities environment, soft computing. Accepted
Wu GC, Baleanu D, Xie HP, Chen FL (2016) Chaos synchronization of fractional chaotic maps based on the stability condition. Physica A 460:374–383
Bai YR, Baleanu D, Wu GC (2018) A novel shuffling technique based on fractional chaotic maps. Optik 168:553–562
Wu GC, Deng ZG, Baleanu D, Zeng DQ (2019) New variable-order fractional chaotic systems for fast image encryption. Chaos 29(8):083–103
Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman & Hall/CRC, Boca Raton
Bergamo P, D’Arco P, Santis A, Kocarev L (2005) Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst I 52(7):1382–1393
Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Solit Fractals 39(3):1283–1289
Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 37(3):669–674
Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Adv. Cryptol. (EUROCRYPT). Tyrol, Austria: Springer, pp 453–474
Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Adv. Cryptol. (EUROCRYPT), Amsterdam, The Netherlands, pp 337–351
Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2018) Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Trans Depend Secure Comput 15(5):824–839
Dua A, Kumar N, Das AK, Susilo W (2018) Secure message communication protocol among vehicles in smart city. IEEE Trans Veh Technol 67(5):4359–4373
Srinivas J, Das AK, Kumar N, Rodrigues J (2020) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Depend Secure Comput 17(5):942–956
Chattaraj D, Sarma M, Das AK (2018) A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput Netw 131:144–164
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In advances in cryptology—CRYPTO. Springer, Santa Barbara, pp 388–397
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multiserver authentication protocol using smart cards. IEEE Trans Inf Foren Secur 10(9):1953–1966
Chen F, Liao X, Wong KW, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17:3848–3856
Meshram C, Li CT, Meshram SG (2019) An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753
Meshram C, Lee CC, Meshram SG, Li CT (2019) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946
Anderson DR, Camrud E, Ulness DJ. On the nature of the conformable derivative and its applications to physics. arXiv preprint arXiv:1810.02005, 2018.
Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36
Das AK, Odelu V, Goswami A (2014) A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function. Sci World J. https://doi.org/10.1155/2014/719470
Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290–306
Tang HB, Liu XS (2012) Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int J Commun Syst 25(12):1639–1644
Farash MS (2017) An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int J Commun Syst 30(1):e2879
Reddy AG, Suresh D, Phaneendra K, Ji SS, Odelu V (2018) Provably secure pseudo-identity based device authentication for smart cities environment. Sustain Cities Soc 41:878–885
Moon J, Lee D, Jung J, Won D (2017) Improvement of efficient and secure smart card-based password authentication scheme. Int J Netw Secur 19(6):1053–1061
Pan H-T, Yang H-W, Hwang M-S (2020) An enhanced secure smart card-based password authentication scheme. Int J Netw Secur 22(2):358–363
Kumari S, Khan MK (2014) Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(12):3939–3955
Algehawi MB, Samsudin A (2010) A new identity-based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. Phys Lett A 374:4670–4674
Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Programs Biomed 135:37–50
Meshram C, Ibrahim RW, Obaidat MS, Sadoun B, Meshram SG, Tembhurne JV (2021) An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput 25(14):8905–8920