Skip to main content

Timestamp Based Authentication Protocol for Smart Card Using ECC

  • Conference paper
Web Information Systems and Mining (WISM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6987))

Included in the following conference series:

Abstract

Elliptic Curve Cryptography is one of the most suitable public key techniques for its small key size and high security and is suitable for secure access of Smart Card. Smart Card based authentication plays a critical role in communication network as they are using embedded processors where resources such as storage, time or power are constrained. We propose a timestamp based ECC authentication protocol which produces multiple session keys during communication in constrained environment to enhance the security. The proposed protocol is efficient as it has improved the performance timings of basic operations like key generation, signature generation / verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)

    Article  Google Scholar 

  2. Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication Scheme using smart cards. IEEE Transactions on Consumer Electronics 49(2), 414–416 (2003)

    Article  Google Scholar 

  3. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Efficient remote user authentication scheme based on generalized ElGamal signature scheme. IEEE Transactions on Consumer Electronics 50(2), 568–570 (2004)

    Article  Google Scholar 

  4. Badra, M., Urien, P.: Introducing Smart Cards to Remote Authenticate Passwords using Public Key Encryption. IEEE, Los Alamitos (2004), 7803-8219-6/04

    Google Scholar 

  5. Liao, I.E., Lee, C.C., Hwang, M.S.: A password authentication scheme over insecure Networks. Journal of Computer and System Sciences 72(4), 727–740 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  6. Yoon, E.J., Yoo, K.Y.: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Liou, Y.P., Lin, J., Wang, S.S.: A New Dynamic ID-Based Remote User Authentication Scheme using Smart Cards. In: Proc. 16th Information Security Conference, Taiwan, pp. 198–205 (2006)

    Google Scholar 

  8. Chatterjee, K., Gupta, D.: Secure access of smart cards using Elliptic Curve Cryptosystems. IEEE Catalog No.CFP09WNM-CDR, WiCOM (2009)

    Google Scholar 

  9. Yang, L., Chen, K.: Cryptanalysis of a Timestamp- Based Password Authentication Scheme (2004), http://eprint.iacr.org/2004/040.pdf

  10. Pathan, A.S.K., Hong, C.S.: An Improved Timestamp-Based Password Authentication Scheme with Two-Party Verification using Smart Cards. In: Proc. of the 9th IEEE ICACT, vol. I, pp. 804–809 (2007)

    Google Scholar 

  11. Wang, X., Zhang, J., Zhang, W., Khan, M.K.: Security Improvement on the Timestamp-based Password Authentication Scheme Using Smart Cards. IEEE Trans. on Consumer Electronics 46(1), 28–30 (2006)

    Google Scholar 

  12. Shen, J.J., Lin, C.W., Hwang, M.S.: Security Enhancement for the Timestamp-Based Password Authentication Schemes using Smart Cards. Computers & Security 22(7), 591–595 (2003)

    Article  Google Scholar 

  13. IEEE: P1363: Standard specifications for public-key cryptography, Draft Version 13 (1999)

    Google Scholar 

  14. Jansma, N., Arrendondo, B.: Performance Comparison of Elliptic Curve and RSA Digital Signatures. University of Michigan, Ann Arbor (2004)

    Google Scholar 

  15. Aydos, M., Yanık, T., Koc, C.K.: High-Speed Implementation of an ECC-based Wireless Authentication Protocol on an ARM Microprocessor. IEE Proceedings: Communications 148(5), 273–279 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chatterjee, K., De, A., Gupta, D. (2011). Timestamp Based Authentication Protocol for Smart Card Using ECC. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23971-7_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23970-0

  • Online ISBN: 978-3-642-23971-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics