Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

03-01-2021

On Authentication Schemes Using Polynomials Over Non Commutative Rings

Authors: Varun Shukla, Atul Chaturvedi, Manoj Kumar Misra

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Authentication is a term very important for data communication security. We see many frauds due to authentication failure. The problem manifolds when communication is over insecure channel. Entity authentication is a term which involves proof of sender’s identity and very useful in various applications like in banking sector and various other client server mechanisms. Availability of quantum computers increases the vulnerability of breaking old protocols. Researchers are finding new platforms to overcome this problem and one such example is non commutative polynomial rings [NCPR]. In 2012, M.R.Vallauri [MRV], in his paper suggested an authentication protocol using NCPR. He has proved security analysis under the assumption that polynomial symmetrical decomposition problem (PSDP) is hard. In this paper we show that the protocol suggested by him is breakable without solving PSDP. We also provide corrected protocol to overcome this problem.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone: Handbook of applied cryptography. fifth edition, CRC press Inc, USA ISBN: 9780849385230, 2001 A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone: Handbook of applied cryptography. fifth edition, CRC press Inc, USA ISBN: 9780849385230, 2001
2.
go back to reference W. Stallings Cryptography and network security, principles and practices. Seventh edition, Prentice Hall, 2005, ISBN-13:978-0134444284, ISBN-10:0134444280 W. Stallings Cryptography and network security, principles and practices. Seventh edition, Prentice Hall, 2005, ISBN-13:978-0134444284, ISBN-10:0134444280
3.
go back to reference Buchanan, W., & Woodward, A. (2017). Will quantum computers be the end of public key encryption? Journal of Cyber Security Technology, 1(1), 28–43.CrossRef Buchanan, W., & Woodward, A. (2017). Will quantum computers be the end of public key encryption? Journal of Cyber Security Technology, 1(1), 28–43.CrossRef
6.
go back to reference Z. Shaikh, P. Garg, Single and multi trusted third party: comparison, identification and reduction of malicious conduct by trusted third party in secure multiparty computing protocol, Advances in computer science, engineering & applications. [Part of the advances in intelligent systems and computing book series (volume 167)], 2012, 295–304 https://doi.org/10.1007/978-3-642-30111-7_28 Z. Shaikh, P. Garg, Single and multi trusted third party: comparison, identification and reduction of malicious conduct by trusted third party in secure multiparty computing protocol, Advances in computer science, engineering & applications. [Part of the advances in intelligent systems and computing book series (volume 167)], 2012, 295–304 https://​doi.​org/​10.​1007/​978-3-642-30111-7_​28
9.
go back to reference R. Cramer, I. Damgård, Efficient zero-knowledge proofs of knowledge without intractability assumptions, International workshop on public key cryptography [Part of the lecture notes in computer science book series (LNCS, volume 1751)], 2000, 354–372 https://doi.org/10.1007/978-3-540-46588-1_24 R. Cramer, I. Damgård, Efficient zero-knowledge proofs of knowledge without intractability assumptions, International workshop on public key cryptography [Part of the lecture notes in computer science book series (LNCS, volume 1751)], 2000, 354–372 https://​doi.​org/​10.​1007/​978-3-540-46588-1_​24
12.
go back to reference H. Gao, C. Bodei, P. Degano, H.R. Nielson, A formal analysis for capturing replay attacks in cryptographic protocols, Annual asian computing science conference [Part of the lecture notes in computer science book series (LNCS, volume 4846)], 2007, 150–165 https://doi.org/10.1007/978-3-540-76929-3_15 H. Gao, C. Bodei, P. Degano, H.R. Nielson, A formal analysis for capturing replay attacks in cryptographic protocols, Annual asian computing science conference [Part of the lecture notes in computer science book series (LNCS, volume 4846)], 2007, 150–165 https://​doi.​org/​10.​1007/​978-3-540-76929-3_​15
13.
go back to reference W.C. Yan, S.H. Heng, B.M. Goi, Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, International conference on autonomic and trusted computing [Part of the lecture notes in computer science book series (LNCS, volume 5060)], 2008, 100–105 https://doi.org/10.1007/978-3-540-69295-9_10 W.C. Yan, S.H. Heng, B.M. Goi, Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, International conference on autonomic and trusted computing [Part of the lecture notes in computer science book series (LNCS, volume 5060)], 2008, 100–105 https://​doi.​org/​10.​1007/​978-3-540-69295-9_​10
14.
go back to reference H. Jung, H.S. Kim, Secure hash-based password authentication protocol using smart cards, International conference on computational science and its applications. [Part of the lecture notes in computer science book series (LNCS, volume 6786)], 2011, 593–606 https://doi.org/10.1007/978-3-642-21934-4_48 H. Jung, H.S. Kim, Secure hash-based password authentication protocol using smart cards, International conference on computational science and its applications. [Part of the lecture notes in computer science book series (LNCS, volume 6786)], 2011, 593–606 https://​doi.​org/​10.​1007/​978-3-642-21934-4_​48
Metadata
Title
On Authentication Schemes Using Polynomials Over Non Commutative Rings
Authors
Varun Shukla
Atul Chaturvedi
Manoj Kumar Misra
Publication date
03-01-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-08008-4

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue