×

Key variation technique based on piggybacking strategies under public key environments. (English) Zbl 1481.94097

Summary: As such various cryptanalytic attacks become stronger day by day, attaining the security over a single key based techniques become a complicated and burning problem among the researchers. Even, in the session key approaches, when session extends for a little bit longer, protecting data in ciphertext only attack also cannot be assured. In this regard, various mechanisms have been proposed to change the key frequently by establishing the session keys in every short interval. But, such schemes may not be suitable and survive for real time applications because of unnecessary increase of network overheads and enhancement of costs exponentially. So, to tackle such problems, we have proposed a true random key variation technique based on piggybacking strategies and one time pad (OTP) under public key environments.

MSC:

94A60 Cryptography
Full Text: DOI

References:

[1] Lamport, L., Password authentication with insecure communication, Commun of the ACM, 24, 11, 770-772 (1981)
[2] Hwang, M. S.; Li, L. H., A new remote user authentication scheme using smart cards, IEEE T Consum Electr, 46, 1, 28-30 (2000)
[3] Lin, C. W.; Tsai, C. S.; Hwang, M. S., A new strong password authentication scheme using one-way Hash functions, J Comput Sys Sc Int+, 45, 4, 623-626 (2006) · Zbl 1263.94031
[4] Baruah, K. C.; Banerjee, S.; Dutta, M. P.; Bhunia, C. T., An Improved Biometric-based Multi server Authentication Scheme using Smart Card, Int J Secur Appl, 9, 1, 397-408 (2015)
[5] Banerjee, S., Dutta, M. P., and Bhunia, C. T., “Cryptanalysis and Security Enhancement of an Efficient and Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environments”, Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARC-SET 2015), March 6-7; Eluru, India, 2015. DOI=doi:10.1145/2743065.2743079
[6] Banerjee, S.; Dutta, M. P.; Bhunia, C. T., An Improved Smart Card based Anonymous Multi-Server Remote User Authentication Scheme, Int J of Smart Home, 9, 5, 11-22 (2015)
[7] Shannon, C. E., A Mathematical Theory of Communication, AT & T Tech J, 27, 379-423 (1948) · Zbl 1154.94303
[8] Shannon, C. E., Communication Theory of Secrecy Systems, AT & T Tech J, 28, 4, 656-715 (1949) · Zbl 1200.94005
[9] Bhunia, C. T., New approaches for selective aes towards tackling error propagation effect of AES, Asian J Inf Tech, 5, 9, 1017-1022 (2006)
[10] Bhunia, C. T., “Application of AVK and selective encryption in improving performance of quantum cryptography and networks”, http://www.Ictp.it/ pub_off, IC/2006/045.
[11] Bhunia, C. T., Mondal, G., and Samaddar, S., “Theory and application of time variant key in RSA and that with selective encryption in AES”, In Proceedings of EAIT (Elsevier Publications, Calcutta CSI), pp. 219-221, 2006.
[12] Chakarabarti, P.; Bhuyan, B.; Chowdhuri, A.; Bhunia, C. T., A novel approach towards realizing optimum data transfer and automatic variable key (AVK) in cryptography, Int J Comput Sci Netw Secur, 8, 5, 241-250 (2008)
[13] Bhunia, C. T., Chakraborty, S. K., and Goswami, R. S., “A new technique (CSAVK) of automatic variable key in achieving perfect security”, 100th Indian Science Congress Association, 2013.
[14] Goswami, R. S.; Chakraborty, S. K.; Bhunia, A.; Bhunia, C. T., New techniques for generating of automatic variable key in achieving perfect security, J Inst Eng India Ser B, 95, 3, 197-201 (2014)
[15] Goswami, R. S., Chakraborty, S. K., Bhunia, A., and Bhunia, C. T., “New approaches towards generation of automatic variable key to achieve perfect security”, In Proceedings of the 10th International Conference on Information Technology, IEEE Computer Society, pp. 489-491, 2013.
[16] Goswami, R. S.; Chakraborty, S. K.; Bhunia, A.; Bhunia, C. T., Generation of automatic variable key under various approaches in cryptography system, J Inst Eng India Ser B, 94, 4, 215-220 (2014)
[17] Goswami, R. S., Chakraborty, S. K., Bhunia, A., and Bhunia, C. T., “Various new methods of implementing AVK”, In Proceedings of the 2nd International Conference Advanced Computer Science and Engineering, pp. 149-152, 2013.
[18] Banerjee, S., Dutta, M. P., and Bhunia, C. T., “A novel approach to achieve the perfect security through avk over insecure communication channel”, J Inst Eng India Ser B (Communicated).
[19] Banerjee, S., Dutta, M. P., and Bhunia, C. T., “A New three dimensional based key generation technique in AVK”, J. Inst. Eng. India Ser. B (Communicated).
[20] Singh, B. K., Banerjee, S., Dutta, M. P., and Bhunia, C. T., “Generation of automatic variable key to make secure communication”, In Proceedings of the International Conference on Recent Cognizance Wireless Communication & Image Processing (ICRCWIP-2014), 2015.
[21] Dutta, M. P., Banerjee, S., and Bhunia, C. T., “Two new schemes to generate automatic variable key (AVK) to achieve the perfect security in insecure communication channel”, In Proceedings of the International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET, Eluru, India), 2015. DOI= doi:10.1145/2743065.2743080.
[22] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., and Vo, S., A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, April 2010.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.