Please enable JavaScript.
Coggle requires JavaScript to display documents.
Secure Authentication Scheme for personal devices - Coggle Diagram
Secure Authentication Scheme for personal devices
Main components of our system
System Model
Server
Client side
Registered devices
User’s terminal
Threat Model
semi-honest model
Design Goals
Security
Verification
Correctness
Authentication Protocol Description
Session Tickets
one-time username OTU
session key k
ticket validity period TVP
timestamp T
access control list ACL
The Proposed Protocol
Cryptographic parameters
Elliptic curve cryptography:
registered device holds its public key and private key
server generates public key and private key
Advanced Encryption Standard
Description
ticket ACL
ticket validity period TV P
consist of:
Algorithm 1
provides the details
Algorithm 2
describes the decryption and verification of the ticket information
Algorithm 3
used by the server to verify the user
Algorithm 4
employed by the user to decrypt the verification code
Security result
resist on:
Phishing Attacks
Password-Related Attacks
Shoulder-Surfing Attacks
Client Request Protection
Server Response Protection
One-Time Pad Property
Limitations
which require both a secure execution environment on smartphones and an underlying security architecture
Performance Evaluation
A. Communication Overhead
144 ×N ×m.
B. Computational Overhead
n_r×(3.98+8.53)=12.51n_r ms.