CFP last date
20 June 2024
Reseach Article

A Review Study of Juang Approach with Overview of Improved Proposed Approach for Multisever Authentication and Key Agreement with User Protection

by Amita Jangid, Vishal Shrivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 6
Year of Publication: 2016
Authors: Amita Jangid, Vishal Shrivastava
10.5120/ijca2016911542

Amita Jangid, Vishal Shrivastava . A Review Study of Juang Approach with Overview of Improved Proposed Approach for Multisever Authentication and Key Agreement with User Protection. International Journal of Computer Applications. 150, 6 ( Sep 2016), 26-29. DOI=10.5120/ijca2016911542

@article{ 10.5120/ijca2016911542,
author = { Amita Jangid, Vishal Shrivastava },
title = { A Review Study of Juang Approach with Overview of Improved Proposed Approach for Multisever Authentication and Key Agreement with User Protection },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 6 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number6/26098-2016911542/ },
doi = { 10.5120/ijca2016911542 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:13.292980+05:30
%A Amita Jangid
%A Vishal Shrivastava
%T A Review Study of Juang Approach with Overview of Improved Proposed Approach for Multisever Authentication and Key Agreement with User Protection
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 6
%P 26-29
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Use of smart card makes remote user verification and key agreement easy, elastic to making a secure scattered system environment. It is very important to provide user privacy protection in authentication phase. In this paper, we are describing the performance comparison of Jung approach for multiple server authentication and key agreement schemes with user protection in network security with our proposed approach. First we are describing the juang approach then overview of our approach with comparison. All the areas those can be improved by us are also defined. Our approach is works for single server as well as multi sever environment. According to our analysis the juang approach is open to the element, leak-of-verifier attack and session key discovery attack and smart card loss attack. We are saving data into the server table in form of digital identity, smart card is removed by us, and so the new approach is safe from smart card loss attack.

References
  1. S. Bellovin and M. Merritt, “Encrypted key exchange: Password-based protocols secure against dictionary attacks,” in Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992
  2. M. Burrows, M. Abadi, and R. Needham, “A Logic of Authentication,” ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18-36, 1990.
  3. Y. Chang and C. Chang, “Authentication schemes with no verification table,” Applied Mathematics and Computation, vol. 167, pp. 820-832, 2005.
  4. W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, 1976..
  5. C. Fan, Y. Chan, and Z. Zhang, “Robust remote authentication scheme with smart cards,” Computers & Security, vol. 24, pp. 619-628, 2005.
  6. M. Hwang, C. Lee, and Y. Tang, “A simple remote user authenticationscheme,” Mathematical and Computer Modelling, vol. 36, pp. 103-107,2002.
  7. W. Juang, “Efficient password authenticated key agreement using smart cards,” Computers & Security, vol. 23, no. 2, pp. 167-173, 2004.
  8. Lamport, “Password authentication with insecure communication,”Communications of the ACM, vol. 24, pp. 770-772, 1981.
  9. W. Juang, “Efficient multi-server password authenticated key agreement using smart cards,” IEEE Transactions on Consumer Electronics,vol. 50, no.1, pp. 251-255, 2004.
  10. A. Lenstra, E. Tromer, A. Shamir, W. Kortsmit, B.Dodson, J. Hughes,and P. Leyland, “Factoring estimates for a 1024-bit RSA modulus,” in Advances in Cryptology (Asiacrypt’03), LNCS 2894, pp. 55-74, Springer,New York, 2003.
  11. I. Lin, M. Hwang, and L. Li, “A new remote user authenticationscheme for multi-server architecture,” Future Generation ComputerSystems, vol. 19, pp.13-22, 2003.
  12. W. Juang, “Efficient multi-server password authenticated key agreement using smart cards,” IEEE Transactions on Consumer Electronics,vol. 50, no.1, pp. 251-255, 2004.
  13. W. Juang and W. Nien, “Efficient password authenticated keyagreement using bilinear pairings,” in the 16th Information SecurityConference, pp. 214-221,Taichung, Taiwan, June 2006.
Index Terms

Computer Science
Information Sciences

Keywords

User verification session key comparison key size smart card network security