Abstract
An improved protocol with a key agreement authentication using parallel Pollard rho algorithm for electronic payment system is proposed in this paper. The protocol employs a two step of key agreement and authentication with parallel Pollard rho and encryption of transaction information using Elliptic Curve Digital Signature Algorithm (ECDSA). Pollard rho was used in parallel as a key calculator that measures attack on discrete logarithm problem (DLP) of three main e-payment parties, namely customer, merchant and bank. Customers card information was used to infer the discrete logarithm problem which in turn was reused by the merchant and bank. The ECDSA was applied to encrypt information, resulting in a combination of the summation of participatory key, l. The length l serves as a diversion against intruders’ attempt to guess the DLP. The result shows that the protocol ensured higher security within a shorter period of time in comparison with others in the literature.





Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Abdurahmonov T, Yeoh ET, Hussain HM (2011) Improving smart card security using elliptic curve cryptography over prime field (f p). In: Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2011. Springer, pp 127–140
Antoniou G, Batten L (2011) E-commerce: protecting purchaser privacy to enforce trust. Electron Commer Res 11(4):421
Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. Supercomputing 71(8):3163–3180
Arshad H, Nikooghadam M (2016) An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl 75(1):181–197
Bakhtiari S, Baraani A, Khayyambashi MR (2009) Mobicash: a new anonymous mobile payment system implemented by elliptic curve cryptography. In: Computer science and information engineering, 2009 WRI World Congress on, vol 3. IEEE, pp 286–290
Bernstein DJ, Lange T, Schwabe P (2011) On the correct use of the negation map in the pollard rho method. In: International Workshop on Public Key Cryptography. Springer, pp 128–146
Bos JW, Kaihara ME, Kleinjung T, Lenstra AK, Montgomery PL (2012) Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Int J Appl Cryptogr 2(3):212–228
Boss E, Schwabe P, Batina L (2015) Solving prime-field ecdlps on gpus with opencl. Master’s thesis, Radboud University Nijmege
Ch SA, Sher M, Ghani A, Naqvi H, Irshad A et al (2015) An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimed Tools Appl 74(5):1711–1723
Chang CC, Chang SC, Lee JS (2009) An on-line electronic check system with mutual authentication. Comput Electr Eng 35(5):757–763
Chaudhry SA, Farash MS, Naqvi H, Sher M (2016) A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron Commer Res 16(1):113–139
Chaudhry SA, Naqvi H, Sher M, Farash MS, Hassan MU (2017) An improved and provably secure privacy preserving authentication protocol for sip. Peer-to-Peer Netw Appl 10(1):1–15
Chou CH, Tsai KY, Lu CF (2013) Two ID-based authenticated schemes with key agreement for mobile environments. Supercomputing 66(2):973–988
Cheon JH, Hong J, Kim M (2008) Speeding up the Pollard rho method on prime fields. Springer, Berlin, pp 471–488
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Ezzouak S, Elamrani M, Azizi A (2014) A variant of pollards rho attack on elliptic curve cryptosystems. J Comput Sci 10:1575–1581
Farash MS, Attari MA (2014) A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J Supercomput 69(1):395–411
Gallant R, Lambert R, Vanstone S (2000) Improving the parallelized pollard lambda search on anomalous binary curves. Math Comput Am Math Soc 69(232):1699–1705
Gayoso Martínez V, Hernández Encinas L, Queiruga Dios A (2015) Security and practical considerations when implementing the elliptic curve integrated encryption scheme. Cryptologia 39(3):244–269
Gebregiyorgis SW (2016) Algorithms for the elliptic curve discrete logarithm and the approximate common divisor problem. Ph.D. thesis, The University of Auckland
Gu J, Park S, Song O, Lee J, Nah J, Sohn S (2003) Mobile pki: A pki-based authentication framework for the next generation mobile communications. In: Australasian Conference on Information Security and Privacy. Springer, pp 180–191
Hall J, Kilbank S, Barbeau M, Kranakis E (2001) Wpp: a secure payment protocol for supporting credit-and debit-card transactions over wireless networks. In: IEEE International Conference on Telecommunications (ICT). Citeseer
Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer, Berlin
He D, Kumar N, Chilamkurti N, Lee JH (2014) Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J Med Syst 38(10):1–6
He D, Zhang Y, Chen J (2014) Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel Pers Commun 74(2):229–243
Hısıl H (2010) Elliptic curves, group law and efficient computation. Ph.D. thesis, Queensland University of Technology
Hisil H, Wong KKH, Carter G, Dawson E (2009) Jacobi quartic curves revisited. In: Australasian Conference on Information Security and Privacy. Springer, pp 452–468
Irshad A, Sher M, Chaudhary SA, Naqvi H, Farash MS (2016) An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre. Supercomputing 72(4):1623–1644
Jansma N, Arrendondo B (2004) Performance comparison of elliptic curve and rsa digital signatures. nicj. net/files
Jiang Q, Ma J, Tian Y (2015) Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int J Commun Syst 28(7):1340–1351
Kirby J (2005) A schanuel condition for weierstrass equations. J Symb Logic 70(02):631–638
Kumar P, Lee HJ (2011) Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: Wireless Advanced (WiAd), 2011. IEEE, pp 241–245
Langley A, Hamburg M (2016) Elliptic curves for security. Order 500:39,081
Le XH, Khalid M, Sankar R, Lee S (2011) An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J Netw 6(3):355–364
Lee WH, Miou CS, Kuan YF, Hsieh TL, Chou CM (2017) A peer-to-peer transaction authentication platform for mobile commerce with semi-offline architecture. Electron Commer Res 17:1–19
Li Sq, Wu Yd, Zhou Jy, Chen Kf (2008) A practical ssl server performance improvement algorithm based on batch rsa decryption. J Shanghai Jiaotong Univ (Sci) 13:67–70
Li X, Wen Q, Zhang H, Jin Z (2013) An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int J Netw Manag 23(5):311–324
Lin P, Chen Hy, Fang Y, Jeng Jy, Lu Fs (2008) A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Trans Wirel Commun 7(7):1536-1276
Lu C, Chen Y, Bian Z (2004) An implementation of fast algorithm for elliptic curve cryptosystem over gf(p). J Electron (China) 21(4):346–352
Mandal S, Mohanty S, Majhi B (2016) Design of electronic payment system based on authenticated key exchange. Electron Commer Res 16:1–30
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Mir O, Munilla J, Kumari S (2017) Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. Peer-to-Peer Network Appl 10(1):79–91
Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using avispa for telecare medical information systems. J Med Syst 39(9):1–16
Okeya K, Kurumatani H, Sakurai K (2000) Elliptic curves with the montgomery-form and their cryptographic applications. In: Imai H, Zheng Y (eds) Public Key Cryptography. PKC 2000, vol 1751. Springer, Berlin, pp 238–257
Pan W, Zheng F, Zhao Y, Zhu WT, Jing J (2017) An efficient elliptic curve cryptography signature server with gpu acceleration. IEEE Trans Inf Forensics Secur 12(1):111–122
Ruiz-Martínez A, Reverte ÓC, Gómez-Skarmeta AF (2012) Payment frameworks for the purchase of electronic products and services. Comput Stand Interfaces 34(1):80–92
Schwabe P (2014) Graphics processing units. In: Markantonakis K, Mayes K (eds) Secure Smart embedded devices, platforms and applications. Springer, pp 179–200
Seet MZ (2007) Elliptic curve cryptography improving the pollard-rho algorithm. Ph.D. thesis, School of Mathematics and Statistics, The University of New South Wales
Shen H, Kumar N, He D, Shen J, Chilamkurti N (2016) A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. Supercomputing 72(9):3588–3600
Shi RH, Zhong H, Zhang S (2015) Comments on two schemes of identity-based user authentication and key agreement for mobile clientserver networks. In: Supercomputing, vol 71, no 11, Springer, pp 4015–4018
Stallings W (2006) Cryptography and network security: principles and practices. Pearson Education India, Delhi
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference On Computer Science and Electronics Engineering (ICCSEE), vol 3. IEEE, pp 648–651
Tan Z (2012) An efficient identity-based tripartite authenticated key agreement protocol. Electron Commer Res 12(4):505–518
Teske E (2001) On random walks for pollards rho method. Math Comput 70(234):809–825
Tiwari A, Sanyal S, Abraham A, Knapskog SJ, Sanyal S (2011) A multi-factor security protocol for wireless payment-secure web authentication using mobile devices. arXiv preprint arXiv:1111.3010
Tu H, Kumar N, Chilamkurti N, Rho S (2015) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Network Appl 8(5):903–910
Van Oorschot PC, Wiener MJ (1999) Parallel collision search with cryptanalytic applications. J Cryptol 12(1):1–28
Vincent OR, Folorunso O, Akinde A (2010) Improving e-payment security using elliptic curve cryptosystem. Electron Commer Res 10(1):27–41
Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Network Secur 3(2):116–119
Wang H, Wang K, Zhang L, Li B (2011) Pairing computation on elliptic curves of jacobi quartic form. Chin J Electron 20(4):655–661
Wang P, Zhang F (2013) Improving the parallelized pollard rho method for computing elliptic curve discrete logarithms. In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE, pp 285–291
Washington LC (2008) Elliptic curves: number theory and cryptography. CRC Press, Baco Raton
Wu S, Chen K (2012) An efficient key-management scheme for hierarchical access control in e-medicine system. J Med Systems 36(4):2325–2337
Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316–323
Yoon EJ, Yoo KY (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. Supercomputing 63(1):235–255
Zhang LP, Wang Y (2010) An id-based authenticated key agreement protocol for wireless sensor networks. J Commun 5(8):620–626
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Vincent, O.R., Lawal, O.M. A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system. J Supercomput 74, 1973–1993 (2018). https://doi.org/10.1007/s11227-017-2204-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-2204-6