Abstract
Elliptic Curve Cryptography is one of the most suitable public key techniques for its small key size and high security and is suitable for secure access of Smart Card. Smart Card based authentication plays a critical role in communication network as they are using embedded processors where resources such as storage, time or power are constrained. We propose a timestamp based ECC authentication protocol which produces multiple session keys during communication in constrained environment to enhance the security. The proposed protocol is efficient as it has improved the performance timings of basic operations like key generation, signature generation / verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770–772 (1981)
Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication Scheme using smart cards. IEEE Transactions on Consumer Electronics 49(2), 414–416 (2003)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Efficient remote user authentication scheme based on generalized ElGamal signature scheme. IEEE Transactions on Consumer Electronics 50(2), 568–570 (2004)
Badra, M., Urien, P.: Introducing Smart Cards to Remote Authenticate Passwords using Public Key Encryption. IEEE, Los Alamitos (2004), 7803-8219-6/04
Liao, I.E., Lee, C.C., Hwang, M.S.: A password authentication scheme over insecure Networks. Journal of Computer and System Sciences 72(4), 727–740 (2006)
Yoon, E.J., Yoo, K.Y.: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499–507. Springer, Heidelberg (2006)
Liou, Y.P., Lin, J., Wang, S.S.: A New Dynamic ID-Based Remote User Authentication Scheme using Smart Cards. In: Proc. 16th Information Security Conference, Taiwan, pp. 198–205 (2006)
Chatterjee, K., Gupta, D.: Secure access of smart cards using Elliptic Curve Cryptosystems. IEEE Catalog No.CFP09WNM-CDR, WiCOM (2009)
Yang, L., Chen, K.: Cryptanalysis of a Timestamp- Based Password Authentication Scheme (2004), http://eprint.iacr.org/2004/040.pdf
Pathan, A.S.K., Hong, C.S.: An Improved Timestamp-Based Password Authentication Scheme with Two-Party Verification using Smart Cards. In: Proc. of the 9th IEEE ICACT, vol. I, pp. 804–809 (2007)
Wang, X., Zhang, J., Zhang, W., Khan, M.K.: Security Improvement on the Timestamp-based Password Authentication Scheme Using Smart Cards. IEEE Trans. on Consumer Electronics 46(1), 28–30 (2006)
Shen, J.J., Lin, C.W., Hwang, M.S.: Security Enhancement for the Timestamp-Based Password Authentication Schemes using Smart Cards. Computers & Security 22(7), 591–595 (2003)
IEEE: P1363: Standard specifications for public-key cryptography, Draft Version 13 (1999)
Jansma, N., Arrendondo, B.: Performance Comparison of Elliptic Curve and RSA Digital Signatures. University of Michigan, Ann Arbor (2004)
Aydos, M., Yanık, T., Koc, C.K.: High-Speed Implementation of an ECC-based Wireless Authentication Protocol on an ARM Microprocessor. IEE Proceedings: Communications 148(5), 273–279 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chatterjee, K., De, A., Gupta, D. (2011). Timestamp Based Authentication Protocol for Smart Card Using ECC. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_46
Download citation
DOI: https://doi.org/10.1007/978-3-642-23971-7_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23970-0
Online ISBN: 978-3-642-23971-7
eBook Packages: Computer ScienceComputer Science (R0)