A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Password-authenticated key exchange (PAKE) is an authentication mechanism where a client and a server who share a password and authenticate each other with that password and hence both will agree on a cryptographic key. Normally, the passwords which are required to verify the clients are stored on a single server. If the server is compromised, due to some malicious operations like hacking or installing a Trojan horse, passwords which are stored in the server gets revealed. In this paper two servers cooperate to authenticate a client and if one server is cooperated, the attacker still cannot act as a client with the evidence from the conceded server. Current solutions for two servers PAKE are either symmetric in the way that the two server correspondingly contribute to the authentication or asymmetric in the sense that one server confirms the authenticity of legal client with the assistance of another server. This paper presents the development of symmetric protocol for two-server PAKE, where the client can establish different cryptographic keys with the two servers. In addition to that a nonce will be generated during the period of authentication and this will act as a timer. If the timer does not expire with in the period limit, the authentication procedure will be carried out within the limit which provides security to replay attacks.
Authors and Affiliations
Ms. Sandra Bhavadas A. B , Ms. Jini K. M
Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop for Extensive Data
Abstract: Map-Reduce is drawing attention of both industrial and academic for processing of big data. In this paper, we have mainly focused on core scheduler of Hadoop i.e. Capacity Scheduler. The scheduler assigns tasks...
Image Security With Different Techniques Of Cryptography And Coding: A Survey
Abstract: Due to the growth of multimedia applications, the protection of this multimedia data becomes a very important issue of communication and storage; especially when it is transferred over an insecure channel...
A Novel Edge Detection Technique for Image Classification and Analysis
The main aim of this project is to propose a new method for image segmentation. Image Segmentation is concerned with splitting an image up into segments (also called regions or areas) that each holds some p...
Colorectal Cancer Detection using Image Processing based on IGVF Model
Colorectal cancer is the third most common cancer in both men and women. Computed Tomography (CT) Colonography is a valid technique for detecting and screening colorectal cancers. In order to accomplish an effective way...
Towards a new ontology of the Moroccan Post-baccalaureatelearner profile for the E-orientation system “MMSyOrientation”
Abstract: Today E-orientation systems are interested in helping learners to choose a suitable branch to theirskills and preferences. In this context the research center within the University Hassan II Mohammedia AinChock...