Reference Hub15
A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem

A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem

Rifaqat Ali, Arup Kumar Pal
Copyright: © 2017 |Volume: 13 |Issue: 1 |Pages: 11
ISSN: 1548-0631|EISSN: 1548-064X|EISBN13: 9781522511397|DOI: 10.4018/IJBDCN.2017010107
Cite Article Cite Article

MLA

Ali, Rifaqat, and Arup Kumar Pal. "A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem." IJBDCN vol.13, no.1 2017: pp.74-84. http://doi.org/10.4018/IJBDCN.2017010107

APA

Ali, R. & Pal, A. K. (2017). A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem. International Journal of Business Data Communications and Networking (IJBDCN), 13(1), 74-84. http://doi.org/10.4018/IJBDCN.2017010107

Chicago

Ali, Rifaqat, and Arup Kumar Pal. "A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem," International Journal of Business Data Communications and Networking (IJBDCN) 13, no.1: 74-84. http://doi.org/10.4018/IJBDCN.2017010107

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In remote user authentication, a server confirms the authenticity of a user via unreliable channel. Several authentication protocols are devised in the literature relied on the identity, password and biometric of a user. But, most of the authentication protocols are either computationally expensive or not-secure from several kinds of malicious threats. In this document, the authors have suggested a secure and robust three-factor (such as password, smartcard and biometric) based authentication scheme by using RSA cryptosystem. The proposed protocol is validated through BAN logic. Then, formal security analysis using random oracle model shows that the identity, password, biometric and session key are highly secure from an adversary. Besides, the informal security analysis of our protocol proves that it withstands to several kinds of malicious attacks. In addition, performance comparison of presented scheme with respect to other schemes is comparatively suitable in the context of communication and computation costs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.