A Novel Authentication Protocol Based on Elliptic Curves

Abstract

Authentication is the process of determining whether someone or something is, in fact, who or that it is declared to be. It is a client-server based protocol by which a server identifies the identity of a remote client when it logs on to the server through unsecured network. In private and public computer networks, authentication is commonly done through the use of logon passwords. Each user registers initially or is registered by someone else, using an assigned or self-declared password. On each subsequent use, the user must know and use the previously declared password. Internet business and many other transactions require a more stringent authentication process. This paper proposes a new authentication protocol to authenticate remote users using elliptic curves. The proposed protocol has three phases- registration phase, login phase, and authentication phase. When a genuine user wants to login the computer system, he has to key in his identity, password and private keys.

Authors and Affiliations

Soram Ranbir Singh , Khomdram Memeta Chanu

Keywords

Related Articles

GUARANTEED COVERAGE PARTICLE SWARM OPTIMIZATION USING NEIGHBORHOOD TOPOLOGIES

The key behind the research represent in this paper is to understand the behavior of the particle swarm algorithm. This study proposes guaranteed convergence Particle Swarm Optimizer (GCPSO) with various topologies. The...

Feature - based Automated Aerial Image to Satellite Image Registration

Image processing is required in number of fields like clinical diagnosis, remote sensing and computer vision. The need for overlaying of images exists in image processing. Image registration is the basis step in various...

A REVIEW PAPER ON SMS TEXT TO PLAIN ENGLISH TRANSLATION(Text Normalization)

Mobile technology as well as social networking technology plays an important role in communication across internet. A large amount of information is found in noisy contexts as texting and chat lingo have become increasin...

A Review: Sobel Canny Hybrid Theoretical Approach & LOG Edge Detection Techniques for Digital Image

Edge detection is an important field in image processing. The purpose of image’s edge Detection is image segmentation, data compression, well matching such as image reconstruction and so on. Images to be compressed are f...

Software Security: A Risk Taxonomy

The implementation of software has been challenging for many organizations. As given in the many reports of important failures, the implementation of packaged software and associated changes in business processes has pro...

Download PDF file
  • EP ID EP130141
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Soram Ranbir Singh, Khomdram Memeta Chanu (2012). A Novel Authentication Protocol Based on Elliptic Curves. International Journal of Computer Science & Engineering Technology, 3(6), 199-212. https://europub.co.uk/articles/-A-130141