Essay On Smart Card Oriented Remote User Authentication Protocol
Looking for research paper writing help? Are you in High School, College, Masters, Bachelors or Ph.D All you need is to ask for research, term paper, thesis help written by a specialist in your academic field. When you buy a customized essay from PremiumPapers.net. We offer you an original, 0%- plagiarized and unique research paper written by a dedicated writer who is PhD or Masters qualified. PremiumPapers.net is an experienced service with over 8 years experience having delivered over 79,500 essays over the years.
Get Your Essay Done by a Specialist
NB: Click Our Prices for more. Our starting prices are as shown below!
Smart Card Oriented Remote User Authentication Protocol
Information technology has progressed in a rapid manner, in this light there have been lots of distributed applications that have come up as a result of this growth. Firstly, there has been the e-commerce, banks, airline reservation systems that have both been developed and deployed into the internet. Therefore, it is natural that with this sensitive system all over the internet, security concerns will arise. To ensure that security is improved, there is a need for an improved robust as well as efficient authenticated key agreement protocol that is designed to support the different applications. The researchers propose a protocol that is designed to improve as well as enhance the security of Yeh et al. scheme. To do this efficiently, they first go about reviewing and analyzing Yeh et al. scheme and then they go ahead to propose their scheme.
The researchers found out that indeed in Yeh et al. proposed two authenticated key agreement protocols, the second protocol had in the issue regarding user anonymity. It is extremely important to realize that indeed user anonymity is a big issue in the Internet. This is because identity theft is propagated when user anonymity does not exist. Further, it is critical also to note that important data that is not intended for the public can be easily retrieved if user anonymity is not achieved in the right manner.
Therefore, the researchers propose a mutual authentication and key agreement. This system is important as it can secure against the attacks above that are susceptible to Yeh et al.’s scheme. However, it is important to note that indeed the proposed scheme by the researchers does not achieve the traceability property that can help hide the user’s identity from malicious attackers.
References
Chang, C. et al., (2011). A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol. 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 252-255.