Elliptic Curve Cryptography based Secure and Efficient Authentication Protocol for Smart Card Users
Javed R. Shaikh1, P. Vijayakumar2, R.Yuvaraj3, Sarang Patil4

1Javed R.Shaikh*, Assistant Professor,, Department of Electonics and Telecommunication, SKN Sinhgad Institute of Technology and Science, Lonavala, India.
2P.Vijayakumar, Associate professor, School of Electronics Engineering, VIT University, Chennai, Tamilnadu, India..
3R.Yuvaraj, Assistant professor (SG) Saveetha school of Engineering, Chennai, India.
4Sarang Patil, Assistant Professor, Department of Electonics and Telecommunication, SKN Sinhgad Institute of Technology and Science, Lonavala, India

Manuscript received on November 18, 2019. | Revised Manuscript received on 27 November, 2019. | Manuscript published on December 10, 2019. | PP: 3393-3397 | Volume-9 Issue-2, December 2019. | Retrieval Number: A7115119119/2019©BEIESP | DOI: 10.35940/ijitee.A7115.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Communication scheme which is used to have communication between authorized remote users over an insecure network is generally the authentication scheme which uses the password for the authentication. Remote user authentication techniques using the smart card have been proposed by many researchers. The main benefit of using the smart card is the storage availability and the computation speed. Huang et al. proposed a scheme for user authentication with smart cards which uses the concept of the timestamp. In Huang et al.’s protocol authors argued that their protocol is secure and efficient against any type of attack. Unfortunately Jung et al. show that Huang et al.’s model fails against the offline password guessing attack and with this scheme wrong password detection is not easy. In Huang et al.’s scheme, RSA cryptosystem is used to offer the authentication. In this article, advanced and secure smart card based authentication protocol using elliptic curve cryptography (ECC) is proposed. This proposed scheme thus overcomes all the possible drawbacks of Huang et al.’s scheme, and it has faster computation as compared to the available schemes Keywords: ECC; E-commerce; Smart Cards; Security Protocols; User authentication.
Keywords: Security, Firefly, Problem Identification, Problem Solving, Performance analysis.
Scope of the Article: Authentication, Authorization, Accounting