Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement

The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks. Recently, a two-factor authentication scheme using hard problems in elliptic curve cryptography (ECC)—the elliptic curve discrete logarithm probl...

Full description

Bibliographic Details
Published in:Mathematics
Main Author: Shohaimay F.; Ismail E.S.
Format: Article
Language:English
Published: MDPI 2023
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85145890990&doi=10.3390%2fmath11010005&partnerID=40&md5=6a0f5fe4c6f07045cefefd7705918197
id 2-s2.0-85145890990
spelling 2-s2.0-85145890990
Shohaimay F.; Ismail E.S.
Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
2023
Mathematics
11
1
10.3390/math11010005
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85145890990&doi=10.3390%2fmath11010005&partnerID=40&md5=6a0f5fe4c6f07045cefefd7705918197
The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks. Recently, a two-factor authentication scheme using hard problems in elliptic curve cryptography (ECC)—the elliptic curve discrete logarithm problem (ECDLP), elliptic curve computational Diffie–Hellman problem (ECCDHP), and elliptic curve factorization problem (ECFP)—was developed, but was unable to address several infeasibility issues while incurring high communication costs. Moreover, previous schemes were shown to be vulnerable to privileged insider attacks. Therefore, this research proposes an improved ECC-based authentication scheme with a session key agreement to rectify the infeasible computations and provide a mechanism for the password change/update phase. The formal security analysis proves that the scheme is provably secure under the random oracle model (ROM) and achieves mutual authentication using BAN logic. Based on the performance analysis, the proposed scheme resists the privileged insider attack and attains all of the security goals while keeping the computational costs lower than other schemes based on the three hard problems. Therefore, the findings suggest the potential applicability of the three hard problems in designing identification and authentication schemes in distributed computer networks. © 2022 by the authors.
MDPI
22277390
English
Article
All Open Access; Gold Open Access
author Shohaimay F.; Ismail E.S.
spellingShingle Shohaimay F.; Ismail E.S.
Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
author_facet Shohaimay F.; Ismail E.S.
author_sort Shohaimay F.; Ismail E.S.
title Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
title_short Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
title_full Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
title_fullStr Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
title_full_unstemmed Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
title_sort Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement
publishDate 2023
container_title Mathematics
container_volume 11
container_issue 1
doi_str_mv 10.3390/math11010005
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85145890990&doi=10.3390%2fmath11010005&partnerID=40&md5=6a0f5fe4c6f07045cefefd7705918197
description The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks. Recently, a two-factor authentication scheme using hard problems in elliptic curve cryptography (ECC)—the elliptic curve discrete logarithm problem (ECDLP), elliptic curve computational Diffie–Hellman problem (ECCDHP), and elliptic curve factorization problem (ECFP)—was developed, but was unable to address several infeasibility issues while incurring high communication costs. Moreover, previous schemes were shown to be vulnerable to privileged insider attacks. Therefore, this research proposes an improved ECC-based authentication scheme with a session key agreement to rectify the infeasible computations and provide a mechanism for the password change/update phase. The formal security analysis proves that the scheme is provably secure under the random oracle model (ROM) and achieves mutual authentication using BAN logic. Based on the performance analysis, the proposed scheme resists the privileged insider attack and attains all of the security goals while keeping the computational costs lower than other schemes based on the three hard problems. Therefore, the findings suggest the potential applicability of the three hard problems in designing identification and authentication schemes in distributed computer networks. © 2022 by the authors.
publisher MDPI
issn 22277390
language English
format Article
accesstype All Open Access; Gold Open Access
record_format scopus
collection Scopus
_version_ 1809677591205904384