1 / 15

A Secure Remote User Authentication Scheme with Smart Cards

A Secure Remote User Authentication Scheme with Smart Cards. Manoj Kumar http://eprint.iacr.org/2008/331,2008 報告者 : 許睿 中 日期 :11.23. Outline. Introduction Notations Scheme Conclusions. Introduction. Register phase. USER. SERVER. Login phase. SERVER. USER. Authentication phase.

kalin
Télécharger la présentation

A Secure Remote User Authentication Scheme with Smart Cards

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Secure Remote User Authentication Scheme with Smart Cards ManojKumar http://eprint.iacr.org/2008/331,2008 報告者:許睿中 日期:11.23

  2. Outline • Introduction • Notations • Scheme • Conclusions

  3. Introduction Register phase USER SERVER Login phase SERVER USER Authentication phase

  4. Introduction • The point of vulnerabilities in a remote user authentication scheme: • Security vulnerabilities due to remote user • Security vulnerabilities due to remote server • Security vulnerabilities due to insecure channel • To solve these vulnerabilities: • mutual authentication • Secure session key generation

  5. Outline • Introduction • Notations • Scheme • Conclusions

  6. Notations

  7. Outline • Introduction • Notations • Schema • Conclusions

  8. Scheme • The Register phase • The Login phase • The Verification phase • The Password change phase

  9. The Register phase U S

  10. The Login phase U S

  11. The Verification phase S U

  12. The Verification phase U S

  13. The Password change phase U S

  14. Outline • Introduction • Notations • Scheme • Conclusions

  15. Conclusions • This scheme not only provides mutual authentication between the user and server , but also establishes a common session key to provide message confidentiality. • In the password change phase of the propose protocol , each user can change his password without connect to any server.

More Related