dor_id: 45766

506.#.#.a: Público

590.#.#.d: Los artículos enviados a la revista "Journal of Applied Research and Technology", se juzgan por medio de un proceso de revisión por pares

510.0.#.a: Scopus, Directory of Open Access Journals (DOAJ); Sistema Regional de Información en Línea para Revistas Científicas de América Latina, el Caribe, España y Portugal (Latindex); Indice de Revistas Latinoamericanas en Ciencias (Periódica); La Red de Revistas Científicas de América Latina y el Caribe, España y Portugal (Redalyc); Consejo Nacional de Ciencia y Tecnología (CONACyT); Google Scholar Citation

561.#.#.u: https://www.icat.unam.mx/

650.#.4.x: Ingenierías

336.#.#.b: article

336.#.#.3: Artículo de Investigación

336.#.#.a: Artículo

351.#.#.6: https://jart.icat.unam.mx/index.php/jart

351.#.#.b: Journal of Applied Research and Technology

351.#.#.a: Artículos

harvesting_group: RevistasUNAM

270.1.#.p: Revistas UNAM. Dirección General de Publicaciones y Fomento Editorial, UNAM en revistas@unam.mx

590.#.#.c: Open Journal Systems (OJS)

270.#.#.d: MX

270.1.#.d: México

590.#.#.b: Concentrador

883.#.#.u: https://revistas.unam.mx/catalogo/

883.#.#.a: Revistas UNAM

590.#.#.a: Coordinación de Difusión Cultural

883.#.#.1: https://www.publicaciones.unam.mx/

883.#.#.q: Dirección General de Publicaciones y Fomento Editorial

850.#.#.a: Universidad Nacional Autónoma de México

856.4.0.u: https://jart.icat.unam.mx/index.php/jart/article/view/151/148

100.1.#.a: Lee, Yung Cheng; Hsieh, Yi Chih; Lee, Pei Ju; You, Peng Sheng

524.#.#.a: Lee, Yung Cheng, et al. (2014). Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards. Journal of Applied Research and Technology; Vol. 12 Núm. 6. Recuperado de https://repositorio.unam.mx/contenidos/45766

245.1.0.a: Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards

502.#.#.c: Universidad Nacional Autónoma de México

561.1.#.a: Instituto de Ciencias Aplicadas y Tecnología, UNAM

264.#.0.c: 2014

264.#.1.c: 2014-12-01

653.#.#.a: Remote authentication; smart cards; discrete logarithm problem

506.1.#.a: La titularidad de los derechos patrimoniales de esta obra pertenece a las instituciones editoras. Su uso se rige por una licencia Creative Commons BY-NC-SA 4.0 Internacional, https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es, para un uso diferente consultar al responsable jurídico del repositorio por medio del correo electrónico gabriel.ascanio@icat.unam.mx

884.#.#.k: https://jart.icat.unam.mx/index.php/jart/article/view/151

001.#.#.#: 074.oai:ojs2.localhost:article/151

041.#.7.h: eng

520.3.#.a: Nowadays, we can easily obtain variety of services through networks. But due to the open environment, networks arevulnerable to many security threats. The remote user authentication scheme is one of the most widely usedmechanisms for servers to authorize users to access the services. In 2009, Ramasamy and Muniyandi proposed adiscrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutualauthentication and withstands the denial of service attack, forgery attack and parallel session attack. In this article, weshow that their scheme is not a practical solution for remote access. It lacks key agreement mechanism and userscannot choose or update passwords freely. Moreover, their scheme cannot resist the stolen-verifier attack, off-lineguessing attack, impersonation attack and smart-card-loss-attack. We propose an improved scheme to remedy thedrawbacks. The improved scheme has the merits of providing mutual authentication and key agreement, whileforward and backward secrecy are ensured as well. The users can choose and update their passwords freely.Furthermore, the scheme can also withstand many attacks such as the smart-card-loss-attack, the replay attack, theoff-line guessing attack, the insider attack, the impersonation attack and the parallel session attack.

773.1.#.t: Journal of Applied Research and Technology; Vol. 12 Núm. 6

773.1.#.o: https://jart.icat.unam.mx/index.php/jart

022.#.#.a: ISSN electrónico: 2448-6736; ISSN: 1665-6423

310.#.#.a: Bimestral

264.#.1.b: Instituto de Ciencias Aplicadas y Tecnología, UNAM

doi: https://doi.org/10.1016/S1665-6423(14)71666-9

harvesting_date: 2023-11-08 13:10:00.0

856.#.0.q: application/pdf

last_modified: 2024-03-19 14:00:00

license_url: https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.es

license_type: by-nc-sa

_deleted_conflicts: 2-e2f2a79a7547134c472b8d0d0b31b7d4

No entro en nada

No entro en nada 2

Artículo

Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards

Lee, Yung Cheng; Hsieh, Yi Chih; Lee, Pei Ju; You, Peng Sheng

Instituto de Ciencias Aplicadas y Tecnología, UNAM, publicado en Journal of Applied Research and Technology, y cosechado de Revistas UNAM

Licencia de uso

Procedencia del contenido

Cita

Lee, Yung Cheng, et al. (2014). Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards. Journal of Applied Research and Technology; Vol. 12 Núm. 6. Recuperado de https://repositorio.unam.mx/contenidos/45766

Descripción del recurso

Autor(es)
Lee, Yung Cheng; Hsieh, Yi Chih; Lee, Pei Ju; You, Peng Sheng
Tipo
Artículo de Investigación
Área del conocimiento
Ingenierías
Título
Improvement of the ElGamal Based Remote Authentication Scheme Using Smart Cards
Fecha
2014-12-01
Resumen
Nowadays, we can easily obtain variety of services through networks. But due to the open environment, networks arevulnerable to many security threats. The remote user authentication scheme is one of the most widely usedmechanisms for servers to authorize users to access the services. In 2009, Ramasamy and Muniyandi proposed adiscrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutualauthentication and withstands the denial of service attack, forgery attack and parallel session attack. In this article, weshow that their scheme is not a practical solution for remote access. It lacks key agreement mechanism and userscannot choose or update passwords freely. Moreover, their scheme cannot resist the stolen-verifier attack, off-lineguessing attack, impersonation attack and smart-card-loss-attack. We propose an improved scheme to remedy thedrawbacks. The improved scheme has the merits of providing mutual authentication and key agreement, whileforward and backward secrecy are ensured as well. The users can choose and update their passwords freely.Furthermore, the scheme can also withstand many attacks such as the smart-card-loss-attack, the replay attack, theoff-line guessing attack, the insider attack, the impersonation attack and the parallel session attack.
Tema
Remote authentication; smart cards; discrete logarithm problem
Idioma
eng
ISSN
ISSN electrónico: 2448-6736; ISSN: 1665-6423

Enlaces