CFP last date
20 May 2024
Reseach Article

Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol

by Nitesh Rastogi, Avinav Pathak, Shweta Rastogi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 9
Year of Publication: 2013
Authors: Nitesh Rastogi, Avinav Pathak, Shweta Rastogi
10.5120/10107-4764

Nitesh Rastogi, Avinav Pathak, Shweta Rastogi . Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol. International Journal of Computer Applications. 62, 9 ( January 2013), 15-19. DOI=10.5120/10107-4764

@article{ 10.5120/10107-4764,
author = { Nitesh Rastogi, Avinav Pathak, Shweta Rastogi },
title = { Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 9 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number9/10107-4764/ },
doi = { 10.5120/10107-4764 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:19.919600+05:30
%A Nitesh Rastogi
%A Avinav Pathak
%A Shweta Rastogi
%T Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 9
%P 15-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Authentication is a process by which both the sender and receiver check and identify the validcommunicative partners prior to initialization of message exchange. Authentication is a security module which is defined at the time of starting of communication between the two communicating entities such as client and server due to the unlimited amount of insecure and malicious intruders it becomes significant to protect the network communication. The protocols are used here for initializing the valid keys and passwords for communicating with the devices. Here we are proposing a new and more secured authentication scheme based on unique identification of every pair of client and server which have entered communication on a global network. This method enhances the present security scenario by diminishing the replay, modification attacks as well as server eavesdropping. This method also enhances the efficiency, integrity, reliability and security in authentication process.

References
  1. Arkko J, et al. Security mechanism agreement for SIP sessions. IETF Internet draft, June 2002.
  2. Franks J. , Hallam-Baker P. , Hostetler J. , Lawrence S. HTTP authentication: Basic and digest access authentication, 2617, IETF Network Working Group, June 1999.
  3. Rosenberg J. , Schulzrinne H. , Camarillo G. , Johnston A. , Peterson J. , Sparks R. , Handley M. and Schooler E. SIP: Session Initiation Protocol. RFC 3261, IETF. The Network Working Group, June 2002.
  4. Lin, C. L. and T. Hwang. "A password authentication scheme with secure password updating," Computers and Security, vol. 22, no. 1, pp. 68-72, 2003.
  5. M. Bellare, A. Boldyreva, A. Desai, D. Pointcheval, Key-privacy in public-key encryption, in: Asiancrypt '01, Lecture Notes in Computer Science, Vol. 2248, Springer, Berlin, 2001, pp. 566–582.
  6. M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, Advances in Cryptology—Eurocrypt' 2000, Lecture Notes in Computer Science, Vol. 1807, Springer, Berlin, 2000, pp. 139–155.
  7. M. Bellare, P. Rogaway, The AuthA protocol for password-based authenticated key exchange, Contributions to IEEE P1363. 2 working group.
  8. CRAMER, R. ANDSHOUP, V. 1998. A practical public key cryptosystem provably secure against adaptive chosen cipher text attack. In Advances in Cryptology—CRYPTO '98, H. Krawczyk,Ed. Springer-Verlag, New York, 13–25.
  9. DIERKS, T. ANDALLEN, C. 1999. The TLS protocol: Version 1. 0. Request for Comments:2246. ftp://ftp. isi. edu/in-notes/rfc2246. txt. DIFFIE, W. , VANOORSCHOT, P. C. , ANDWIENER, M. J. 1992. Authentication and authenticated key exchanges. Des. Codes Cryptography 2, 2 (June 1992), 107–125.
  10. S. Bellovin, M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proc. 1992 IEEE Computer Society Conf. on Research in Security and Privacy, 1992, pp. 72–84
  11. C. Boyd, P. Montague, K. Nguyen, Elliptic curve based password authenticated key exchange protocols, in: ACISP '01, Lecture Notes in Computer Science, Vol. 2119, Springer, Berlin, 2001, pp. 487–501.
  12. E. Bresson, O. Chevassut, D. Pointcheval, Security proofs for an efficient password-based key exchange, Proc. 10th ACM Conf. on Computer and Communications Security, 2003, pp. 241–250.
Index Terms

Computer Science
Information Sciences

Keywords

Challenge Response Authentication Password Public/Private Keys Message Digest Unique List