Skip to main content

A Provable Secure Authentication Protocol Given Forward Secure Session Key

  • Conference paper
Book cover Progress in WWW Research and Development (APWeb 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4976))

Included in the following conference series:

Abstract

This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. Another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even if an attacker steals the parameters from the KDC, the attacker still can not calculate session key. We use BAN logic to proof these merits of our proposed protocol. Also according to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kohl and Neuman, The Kerberos network authentication service (v5). In: Internet Request for Comments RFC-1510 (1993)

    Google Scholar 

  2. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communication of the ACM 21(12), 993–999 (1978)

    Article  MATH  Google Scholar 

  3. Neuman, B.C., Ts’o, T.: Kerberos: An authentication service for computer networks. IEEE Communications 32(9), 33–38 (1994)

    Article  Google Scholar 

  4. Bellovin, S.M., Merrit, M.: Limitations of the Kerberos authentication system. Computer Communication Review 20(5), 119–132 (1990)

    Article  Google Scholar 

  5. Ganesan, R.: Yaksha: augmenting Kerberos with public key cryptography. In: Ganesan, R. (ed.) SNDSS’95: Proceedings of the 1995 Symposium on Network and Distributed System Security, pp. 132–143. IEEE Computer Society Press, Los Alamitos (1995)

    Chapter  Google Scholar 

  6. Sirbu, M.A., Chuang, J.C.I.: Distributed authentication in Kerberos using public key cryptography. In: Proceedings of the 1997 Symposium on Network and Distributed System Security, IEEE Computer Society, pp. 134–141. IEEE Computer Society, Los Alamitos (1997)

    Chapter  Google Scholar 

  7. Molva, R., Tsudik, G., van Herreweghen, E., Zatti, S.: KryptoKnight authentication and key Distribution System. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, pp. 155–174. Springer, Heidelberg (1992)

    Chapter  Google Scholar 

  8. Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: The KryptoKnight family of Light-weight protocols for authentication and key distribution. IEEE Transactions on Networking 3(1), 31–42 (1995)

    Article  Google Scholar 

  9. Syverson, P.: On key distribution protocols for repeated authentication. ACM SIGOPS Operating Systems Review 27(4), 24–30 (1993)

    Article  Google Scholar 

  10. Aslan, H.K.: Logical analysis of AUTHMAC_DH: A new protocol for authentication and key distribution. Computers & Security 23(4), 290–299 (2004)

    Article  Google Scholar 

  11. Chien, H.Y., Jan, J.K.: A hybrid authentication protocol for large mobile network. Journal of Systems and Software 67(2), 123–130 (2003)

    Article  Google Scholar 

  12. Shieh, S.P., Ho, F.S., Huang, Y.L.: An efficient authentication protocol for mobile networks. Information Science and Engineering 15(4), 505–520 (1999)

    Google Scholar 

  13. Hwang, R.-J., Su, F.-F.: A new efficient authentication protocol for mobile networks. Computer Standards & Interfaces 28(2), 241–252 (2005)

    Article  MathSciNet  Google Scholar 

  14. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)

    Article  Google Scholar 

  15. Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security 24(8), 619–628 (2005)

    Article  Google Scholar 

  16. Hwang, M.S., Lin, I.C., Li, L.H.: A simple micro-payment scheme. Journal of Systems and Software 55(3), 221–229 (2001)

    Article  Google Scholar 

  17. Chang, C.C., Lail, C.S., Harn, L.: Contemporary Cryptography and its Applications, 2nd edn. Unalis Co (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yanchun Zhang Ge Yu Elisa Bertino Guandong Xu

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, W., Jang, I., Yoo, H.S. (2008). A Provable Secure Authentication Protocol Given Forward Secure Session Key. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds) Progress in WWW Research and Development. APWeb 2008. Lecture Notes in Computer Science, vol 4976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78849-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78849-2_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78848-5

  • Online ISBN: 978-3-540-78849-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics