Revista: | Journal of applied research and technology |
Base de datos: | PERIÓDICA |
Número de sistema: | 000427685 |
ISSN: | 1665-6423 |
Autores: | Kumari K, Anitha1 Sadasivam G, Sudha2 |
Instituciones: | 1PSG College of Technology, Department of Information Technology, Coimbatore, Tamil Nadu. India 2PSC College of Technology, Coimbatore, Tamil Nadu. India |
Año: | 2018 |
Periodo: | Feb |
Volumen: | 16 |
Número: | 1 |
País: | México |
Idioma: | Inglés |
Tipo de documento: | Artículo |
Enfoque: | Aplicado, descriptivo |
Resumen en inglés | In emerging technological world, security potentially remains as a highest challenge in the large-scale distributed systems, as it is suffering extensively with adversaria! attacks due to insufficient mutual authentication. In order to address this, a state-of-art tetrahedron (3D) based two-server Password Authenticated and Key Exchange (PAKE) protocol has been formulated with formal proof of security by incorporating the elementary properties of plañe geometry. The main intention of this work is, obtaining a password from the stored credentials must be infeasible when both the servers compromised together. At the outset to realize these goals, in this paper, the properties of the tetrahedron are utilized along with Diffie-Hellman (DH) key exchange algorithm to withstand against malicious attacks. A significant aspect of the proposed 3D PAKE protocol is, client side complexity has been reduced to a greater extent in terms of computation and communication. Both theoretically and practically, 3D PAKE protocol is the first demonstrable secure two-server PAKE protocol that breaks the assumptions of the Yang et al. and Yi et al. protocol that the two servers must not compromise together. Computational complexity, communication complexity, security key principies, best of all attacks happening dubiously are considered as the evaluation parameters to compare the performance of the proposed 3D PAKE protocol |
Disciplinas: | Ciencias de la computación |
Palabras clave: | Redes, Seguridad en cómputo, Autenticación remota |
Keyword: | Networks, Computing security, Remote authentication |
Texto completo: | Texto completo (Ver HTML) Texto completo (Ver PDF) |