Remote Access Control Mechanism Using Rabin Public Key Cryptosystem

There is no efficient algorithm for factoring a large composite number in polynomial time and the security of the Rabin cryptosystem is based on it. As large number of internet users access the web server everyday through insecure channel, therefore, user authentication along with privacy over the world is very important. In this paper, we first proposed Rabin cryptosystem based remote login authentication protocol without using smart card for accessing the web server securely. This paper not only proposed the authentication protocol, but it also applies well popular BAN logic to analyze the security of the proposed protocol. Additionally, we have presented informal security analysis. The proposed protocol not only contributes strong security, but it also achieves others advantages like mutual authentication property, efficient and user-friendly password change phase and an approach which helps to recover the forgot password securely.

[1]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[2]  G. P. Biswas,et al.  Improved remote login scheme based on ECC , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[3]  Jia-Yong Liu,et al.  A new mutual authentication scheme based on nonce and smart cards , 2008, Comput. Commun..

[4]  Ruhul Amin Cryptanalysis and an Efficient Secure ID-based Remote User Authentication using Smart Card , 2013 .

[5]  Muhammad Khurram Khan,et al.  Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.

[6]  Sheng Yu,et al.  Improvement upon Mutual Password Authentication Scheme , 2008, 2008 International Seminar on Business and Information Management.

[7]  Ashutosh Saxena,et al.  An improved bilinear pairing based remote user authentication scheme , 2009, Comput. Stand. Interfaces.

[8]  Jia-Lun Tsai,et al.  New dynamic ID authentication scheme using smart cards , 2010, Int. J. Commun. Syst..

[9]  Debiao He,et al.  Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol , 2012, Nonlinear Dynamics.

[10]  Ya-Fen Chang,et al.  A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care , 2013, Journal of Medical Systems.

[11]  Cheng-Chi Lee,et al.  A Robust Remote User Authentication Scheme Using Smart Card , 2011, Inf. Technol. Control..

[12]  Lih-Chyau Wuu,et al.  A Secure Password-Based Remote User Authentication Scheme without Smart Cards , 2012, Inf. Technol. Control..

[13]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[14]  Tanmoy Maitra,et al.  An Improvement of Wang. et. al.'s Remote User Authentication Scheme Against Smart Card Security Breach , 2013 .

[15]  Jing-Jang Hwang,et al.  Improvement on Peyravian-Zunic's Password Authentication Schemes , 2002 .

[16]  Dong Hoon Lee,et al.  A remote user authentication scheme without using smart cards , 2009, Comput. Stand. Interfaces.