Skip to main content
Erschienen in: Wireless Personal Communications 1/2021

03.01.2021

On Authentication Schemes Using Polynomials Over Non Commutative Rings

verfasst von: Varun Shukla, Atul Chaturvedi, Manoj Kumar Misra

Erschienen in: Wireless Personal Communications | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Authentication is a term very important for data communication security. We see many frauds due to authentication failure. The problem manifolds when communication is over insecure channel. Entity authentication is a term which involves proof of sender’s identity and very useful in various applications like in banking sector and various other client server mechanisms. Availability of quantum computers increases the vulnerability of breaking old protocols. Researchers are finding new platforms to overcome this problem and one such example is non commutative polynomial rings [NCPR]. In 2012, M.R.Vallauri [MRV], in his paper suggested an authentication protocol using NCPR. He has proved security analysis under the assumption that polynomial symmetrical decomposition problem (PSDP) is hard. In this paper we show that the protocol suggested by him is breakable without solving PSDP. We also provide corrected protocol to overcome this problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone: Handbook of applied cryptography. fifth edition, CRC press Inc, USA ISBN: 9780849385230, 2001 A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone: Handbook of applied cryptography. fifth edition, CRC press Inc, USA ISBN: 9780849385230, 2001
2.
Zurück zum Zitat W. Stallings Cryptography and network security, principles and practices. Seventh edition, Prentice Hall, 2005, ISBN-13:978-0134444284, ISBN-10:0134444280 W. Stallings Cryptography and network security, principles and practices. Seventh edition, Prentice Hall, 2005, ISBN-13:978-0134444284, ISBN-10:0134444280
3.
Zurück zum Zitat Buchanan, W., & Woodward, A. (2017). Will quantum computers be the end of public key encryption? Journal of Cyber Security Technology, 1(1), 28–43.CrossRef Buchanan, W., & Woodward, A. (2017). Will quantum computers be the end of public key encryption? Journal of Cyber Security Technology, 1(1), 28–43.CrossRef
6.
Zurück zum Zitat Z. Shaikh, P. Garg, Single and multi trusted third party: comparison, identification and reduction of malicious conduct by trusted third party in secure multiparty computing protocol, Advances in computer science, engineering & applications. [Part of the advances in intelligent systems and computing book series (volume 167)], 2012, 295–304 https://doi.org/10.1007/978-3-642-30111-7_28 Z. Shaikh, P. Garg, Single and multi trusted third party: comparison, identification and reduction of malicious conduct by trusted third party in secure multiparty computing protocol, Advances in computer science, engineering & applications. [Part of the advances in intelligent systems and computing book series (volume 167)], 2012, 295–304 https://​doi.​org/​10.​1007/​978-3-642-30111-7_​28
9.
Zurück zum Zitat R. Cramer, I. Damgård, Efficient zero-knowledge proofs of knowledge without intractability assumptions, International workshop on public key cryptography [Part of the lecture notes in computer science book series (LNCS, volume 1751)], 2000, 354–372 https://doi.org/10.1007/978-3-540-46588-1_24 R. Cramer, I. Damgård, Efficient zero-knowledge proofs of knowledge without intractability assumptions, International workshop on public key cryptography [Part of the lecture notes in computer science book series (LNCS, volume 1751)], 2000, 354–372 https://​doi.​org/​10.​1007/​978-3-540-46588-1_​24
12.
Zurück zum Zitat H. Gao, C. Bodei, P. Degano, H.R. Nielson, A formal analysis for capturing replay attacks in cryptographic protocols, Annual asian computing science conference [Part of the lecture notes in computer science book series (LNCS, volume 4846)], 2007, 150–165 https://doi.org/10.1007/978-3-540-76929-3_15 H. Gao, C. Bodei, P. Degano, H.R. Nielson, A formal analysis for capturing replay attacks in cryptographic protocols, Annual asian computing science conference [Part of the lecture notes in computer science book series (LNCS, volume 4846)], 2007, 150–165 https://​doi.​org/​10.​1007/​978-3-540-76929-3_​15
13.
Zurück zum Zitat W.C. Yan, S.H. Heng, B.M. Goi, Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, International conference on autonomic and trusted computing [Part of the lecture notes in computer science book series (LNCS, volume 5060)], 2008, 100–105 https://doi.org/10.1007/978-3-540-69295-9_10 W.C. Yan, S.H. Heng, B.M. Goi, Off-line keyword guessing attacks on recent public key encryption with keyword search schemes, International conference on autonomic and trusted computing [Part of the lecture notes in computer science book series (LNCS, volume 5060)], 2008, 100–105 https://​doi.​org/​10.​1007/​978-3-540-69295-9_​10
14.
Zurück zum Zitat H. Jung, H.S. Kim, Secure hash-based password authentication protocol using smart cards, International conference on computational science and its applications. [Part of the lecture notes in computer science book series (LNCS, volume 6786)], 2011, 593–606 https://doi.org/10.1007/978-3-642-21934-4_48 H. Jung, H.S. Kim, Secure hash-based password authentication protocol using smart cards, International conference on computational science and its applications. [Part of the lecture notes in computer science book series (LNCS, volume 6786)], 2011, 593–606 https://​doi.​org/​10.​1007/​978-3-642-21934-4_​48
Metadaten
Titel
On Authentication Schemes Using Polynomials Over Non Commutative Rings
verfasst von
Varun Shukla
Atul Chaturvedi
Manoj Kumar Misra
Publikationsdatum
03.01.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-08008-4

Weitere Artikel der Ausgabe 1/2021

Wireless Personal Communications 1/2021 Zur Ausgabe

Neuer Inhalt