Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment

Data encryption scheme has been used widely in network communication. It mainly contains two encryption schemes: symmetric key encryption and asymmetric key encryption. Symmetric key encryption has the fast encryption character, while it cannot transmit key in unsafe channel due to the same encryption key and decryption key. On the contrary, asymmetric key encryption has the different encryption key and decryption key. But its encryption speed is too slow. Especially, the above schemes cannot effectively conduct secure password authentication and password update under unstable network environment when user logins remote management. To solve this question, we propose a mixed symmetric key and elliptic curve encryption scheme for password authentication and update. Our new scheme is composed of four stages: registration, password authentication, password update and session key distribution. In addition, it provides defence to answer various attack such as password guessing attack, server spoofing attack, data eavesdropping and replay attack. What’s more, the new method generates a common symmetric key encryption, which needs less convergence time than traditional asymmetric key encryption. Finally, we give the performance and efficiency analysis for this new scheme. Also there are comparison experiments with the latest encryption schemes to demonstrate the effectiveness of our new method.

[1]  Eun-Jun Yoon,et al.  Further improvement of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.

[2]  King-Hang Wang,et al.  Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol” , 2016, Nonlinear Dynamics.

[3]  Qiang Tang,et al.  Extend the Concept of Public Key Encryption with Delegated Search , 2015, Comput. J..

[4]  Shoulin Yin,et al.  A New Provable Secure Certificateless Aggregate Signcryption Scheme , 2016, J. Inf. Hiding Multim. Signal Process..

[5]  Hui Li,et al.  An Effcient and Secure Biometrics-based One-Time Identity-Password Authenticated Scheme for E-coupon System towards Mobile Internet , 2015, J. Inf. Hiding Multim. Signal Process..

[6]  Torsion groups of elliptic curves over quadratic fields , 2011, 1103.5906.

[7]  Guomin Yang,et al.  Cross-domain password-based authenticated key exchange revisited , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Shinsuke Tamura,et al.  A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets , 2015, 2015 International Conference on Networking Systems and Security (NSysS).

[9]  Fahad Bin Muhaya,et al.  Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps , 2015, Wireless Personal Communications.

[10]  Chan Yeob Yeun,et al.  Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2016, Wireless Personal Communications.

[11]  Chantal David,et al.  The Frequency of Elliptic Curve Groups over Prime Finite Fields , 2014, Canadian Journal of Mathematics.

[12]  Chien-Ming Chen,et al.  On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol , 2016, J. Netw. Intell..

[13]  Chun-Li Lin,et al.  A password authentication scheme with secure password updating , 2003, Comput. Secur..

[14]  Shoulin Yin,et al.  A K-means Approach for Map-Reduce Model and Social Network Privacy Protection , 2016, J. Inf. Hiding Multim. Signal Process..

[15]  G. P. Biswas,et al.  Design of improved password authentication and update scheme based on elliptic curve cryptography , 2013, Math. Comput. Model..

[16]  Sk Hafizul Islam,et al.  Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps , 2014 .

[17]  Computing the Cassels-Tate pairing on the 3-Selmer group of an elliptic curve , 2013, 1306.1410.

[18]  M. Aswatha Kumar,et al.  Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p) , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[19]  Hoon-Jae Lee,et al.  An Efficient Encryption Scheme using Elliptic Curve Cryptography (ECC) with Symmetric Algorithm for Healthcare System , 2014 .