Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card

Complex & Intelligent Systems - Tập 8 - Trang 973-987 - 2021
Chandrashekhar Meshram1, Sarita Gajbhiye Meshram2, Rabha W. Ibrahim3, Hamid A. Jalab4, Sajjad Shaukat Jamal5, Sharad Kumar Barve2
1Department of Post Graduate Studies and Research in Mathematics, Jaywanti Haksar Government Post-Graduation College, College of Chhindwara University, Betul, India
2Water Resources & Applied Mathematics Research Lab, Nagpur, India
3IEEE: 94086547, Kuala Lumpur, Malaysia
4Department of Computer System and Technology -Multimedia Unit, Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia
5Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia

Tóm tắt

With the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.

Tài liệu tham khảo

Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1:6–21 Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Solit Fract 39(3):1283–1289 Hwu F (1993) The interpolating random spline cryptosystem and the chaotic-map public-key cryptosystem. Ph.D. thesis, University of Missouri Rolla ElGmal T (1995) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472 Chen BL, Kuo WC, Wu LC (2014) Robust smartcard-based remote user password authentication scheme. Int J Commun Syst 27:377–389 Ma CG, Wang D, Zhao SD (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215–2227 Xu J, Zhu WT, Feng DG (2009) An improved smartcard-based password authentication scheme with provable security. Comput Stand Interfaces 31(4):723–728 Song R (2010) Advanced smartcard-based password authentication protocol. Comput Stand Interfaces 32(5):321–325 Song R, Korba L, Yee G (2007) Analysis of smart card-based remote user authentication schemes. In: Proceedings of the 2007 International Conference on Security and Management. Las Vegas, USA, pp 323–329 Sood SK, Sarje AK, Singh K (2010) An improvement of Xu et al.’s authentication scheme using smartcards. In: Proceedings of the Third Annual ACM Bangalore Conference, Bangalore, Karnataka, India, pp 17–25 Joye M, Olivier F (2010) Side-channel analysis, encyclopedia of cryptography and security. Kluwer Academic Publishers Springer, Berlin, pp 571–576 Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of Advances in Cryptology (Crypto’99), LNCS. Springer Berlin Heidelberg, pp 388–397 Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552 Chen C, He DJ, Chan SM, Bu JJ, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347–362 Li X, Niu J, Khan MK, Liao J (2013) An enhanced smartcard based remote user password authentication scheme. J Netw Comput Appl 36:1365–1371 Islam SKH (2016) Design and analysis of an improved smartcard–based remote user password authentication scheme. Int J Commun Syst 29(11):1708–1719 Li X, Niu J, Kumari S, Islam SKH, Wu F, Khan MK, Das AK (2016) A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel Pers Commun 89(2):569–597 Luo M, Zhang Y, Khan MK, He D (2017) An efficient chaos-based two-party key agreement protocol with provable security. Int J Commun Syst 30(14):e3288 Li CT, Chen CL, Lee CC, Weng CY, Chen CM (2018) A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput 22:2495–2506 Zhao Y, Li S, Jiang L, Liu T (2019) Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps. Int J Distrib Sens Netw 15(4):1–12 Dharminder D, Gupta P (2019) Security analysis and application of Chebyshev Chaotic map in the authentication protocols. Int J Comput Appl. https://doi.org/10.1080/1206212X.2019.1682238 Mishra D, Kumar V, Dharminder D, Rana S (2020) SFVCC: chaotic map-based security framework for vehicular cloud computing. IET Intel Transp Syst 14(4):241–249 Meshram C, Ibrahim RW, Deng L, Shende SW, Meshram SG, Barve SK (2021) A Robust smart card and remote user password-based authentication protocol using extended chaotic-maps under smart cities environment, soft computing. Accepted Wu GC, Baleanu D, Xie HP, Chen FL (2016) Chaos synchronization of fractional chaotic maps based on the stability condition. Physica A 460:374–383 Bai YR, Baleanu D, Wu GC (2018) A novel shuffling technique based on fractional chaotic maps. Optik 168:553–562 Wu GC, Deng ZG, Baleanu D, Zeng DQ (2019) New variable-order fractional chaotic systems for fast image encryption. Chaos 29(8):083–103 Mason JC, Handscomb DC (2003) Chebyshev polynomials. Chapman & Hall/CRC, Boca Raton Bergamo P, D’Arco P, Santis A, Kocarev L (2005) Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst I 52(7):1382–1393 Han S, Chang E (2009) Chaotic map based key agreement with/out clock synchronization. Choas Solit Fractals 39(3):1283–1289 Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fractals 37(3):669–674 Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Adv. Cryptol. (EUROCRYPT). Tyrol, Austria: Springer, pp 453–474 Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Adv. Cryptol. (EUROCRYPT), Amsterdam, The Netherlands, pp 337–351 Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Vasilakos AV (2018) Secure biometric-based authentication scheme using chebyshev chaotic map for multi-server environment. IEEE Trans Depend Secure Comput 15(5):824–839 Dua A, Kumar N, Das AK, Susilo W (2018) Secure message communication protocol among vehicles in smart city. IEEE Trans Veh Technol 67(5):4359–4373 Srinivas J, Das AK, Kumar N, Rodrigues J (2020) Cloud centric authentication for wearable healthcare monitoring system. IEEE Trans Depend Secure Comput 17(5):942–956 Chattaraj D, Sarma M, Das AK (2018) A new two-server authentication and key agreement protocol for accessing secure cloud services. Comput Netw 131:144–164 Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In advances in cryptology—CRYPTO. Springer, Santa Barbara, pp 388–397 Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552 Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multiserver authentication protocol using smart cards. IEEE Trans Inf Foren Secur 10(9):1953–1966 Chen F, Liao X, Wong KW, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17:3848–3856 Meshram C, Li CT, Meshram SG (2019) An efficient online/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747–753 Meshram C, Lee CC, Meshram SG, Li CT (2019) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937–6946 Anderson DR, Camrud E, Ulness DJ. On the nature of the conformable derivative and its applications to physics. arXiv preprint arXiv:1810.02005, 2018. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36 Das AK, Odelu V, Goswami A (2014) A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function. Sci World J. https://doi.org/10.1155/2014/719470 Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290–306 Tang HB, Liu XS (2012) Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int J Commun Syst 25(12):1639–1644 Farash MS (2017) An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int J Commun Syst 30(1):e2879 Reddy AG, Suresh D, Phaneendra K, Ji SS, Odelu V (2018) Provably secure pseudo-identity based device authentication for smart cities environment. Sustain Cities Soc 41:878–885 Moon J, Lee D, Jung J, Won D (2017) Improvement of efficient and secure smart card-based password authentication scheme. Int J Netw Secur 19(6):1053–1061 Pan H-T, Yang H-W, Hwang M-S (2020) An enhanced secure smart card-based password authentication scheme. Int J Netw Secur 22(2):358–363 Kumari S, Khan MK (2014) Cryptanalysis and improvement of ‘a robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(12):3939–3955 Algehawi MB, Samsudin A (2010) A new identity-based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. Phys Lett A 374:4670–4674 Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Programs Biomed 135:37–50 Meshram C, Ibrahim RW, Obaidat MS, Sadoun B, Meshram SG, Tembhurne JV (2021) An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput 25(14):8905–8920