Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card

被引:5
|
作者
Meshram, Chandrashekhar [1 ]
Meshram, Sarita Gajbhiye [2 ]
Ibrahim, Rabha W. [3 ]
Jalab, Hamid A. [4 ]
Jamal, Sajjad Shaukat [5 ]
Barve, Sharad Kumar [2 ]
机构
[1] Coll Chhindwara Univ, Jaywanti Haksar Govt Postgrad Coll, Dept Post Grad Studies & Res Math, Betul 480001, India
[2] Water Resources & Appl Math Res Lab, Nagpur, Maharashtra, India
[3] IEEE 94086547, Kuala Lumpur 59200, Malaysia
[4] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Multimedia Unit, Kuala Lumpur 50603, Malaysia
[5] King Khalid Univ, Coll Sci, Dept Math, Abha, Saudi Arabia
关键词
Mutual authentication; Smart card; Session key; Conformable chaotic map; Fractional calculus; Conformable calculus; Perfect forward secrecy; Hash function; Cryptography; KEY-EXCHANGE; CRYPTANALYSIS; ANONYMITY; SECURITY;
D O I
10.1007/s40747-021-00555-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid advancement and growth of computer networks, there have been greater and greater demands for remote user password authentication protocols. In current ages, smartcard-based authentication protocol has formed the standard with their incredibly insubstantial, user-friendly equipment and low-cost apps. In this study, we proposed an effective robust authentication protocol using the conformable chaotic map, where a conformable calculus is a branch of newly appearing fractional calculus. It has a magnificent property, because it formulates using a controller term. We shall also offer formal proof of smooth execution of the proposed authenticated protocol. Our new protocol is more secure as compared to several comparable protocols.
引用
收藏
页码:973 / 987
页数:15
相关论文
共 50 条
  • [21] Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
    Wei-Chuen Yau
    Raphael C.-W. Phan
    Nonlinear Dynamics, 2015, 79 : 809 - 821
  • [22] A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services
    Dharminder, Dharminder
    Kumar, Uddeshaya
    Gupta, Pratik
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (05) : 2531 - 2542
  • [23] More secure smart card-based remote user password authentication scheme with user anonymity
    Kumari, Saru
    Khan, Muhammad Khurram
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2039 - 2053
  • [24] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhang, Zhihua
    Wang, Huanwen
    Gao, Yanghua
    PERSONAL AND UBIQUITOUS COMPUTING, 2015, 19 (07) : 1053 - 1061
  • [25] C2MP: Chebyshev chaotic map-based authentication protocol for RFID applications
    Zhihua Zhang
    Huanwen Wang
    Yanghua Gao
    Personal and Ubiquitous Computing, 2015, 19 : 1053 - 1061
  • [26] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder Dharminder
    Nibedita Kundu
    Dheerendra Mishra
    Journal of Medical Systems, 2021, 45
  • [27] Construction of a Chaotic Map-Based Authentication Protocol for TMIS
    Dharminder, Dharminder
    Kundu, Nibedita
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2021, 45 (08)
  • [28] Security Weaknesses of Li's Remote User Password Authentication Scheme Using Smart Card
    Ling, Jie
    Zhao, Guang-Qiang
    Liu, Yi
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 677 - 681
  • [29] Offline Password Guessing Attacks on Smart-Card-Based Remote User Authentication Schemes
    Li, Xue-lei
    Wen, Qiao-yan
    Zhang, Hua
    Jin, Zheng-ping
    Li, Wen-min
    PROCEEDINGS OF THE 6TH INTERNATIONAL ASIA CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT INNOVATION, VOL 2: INNOVATION AND PRACTICE OF INDUSTRIAL ENGINEERING AND MANAGMENT, 2016, : 81 - 89
  • [30] Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
    Kumari, Saru
    Khan, Muhammad Khurram
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3939 - 3955