Professional Documents
Culture Documents
Outline
Introduction
on Bilinear Pairing
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Proposed
eUASBP
Security
Analysis of
eUASBP Presented By Research Supervisor
Results and
Analysis
Sangeetha R. Prof. N. Ramasubramanian
Other
Advantages Department of Computer Science and Engineering
Conclusion National Institute of Technology, Tiruchirappalli
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 1 / 31
Outline
Outline
1 Introduction
Introduction 2 Related Work
Related Work
Motivation
3 Motivation
Awasthi’s
Scheme
4 Awasthi’s Scheme
Security 5 Security analysis of Awasthi’s scheme
analysis of
Awasthi’s
scheme 6 Proposed eUASBP
Proposed
eUASBP 7 Security Analysis of eUASBP
Security
Analysis of
eUASBP
8 Results and Analysis
Results and
Analysis
9 Other Advantages
Other
Advantages 10 Conclusion
Conclusion
11 Publications
Publications
References
12 References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 2 / 31
Introduction
Outline
Introduction
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 3 / 31
Introduction continued.,
Outline
Introduction
Related Work
Elliptic Curve Cryptography
Motivation provides the same security strength as like RSA but with
Awasthi’s
the minimum key size.
Scheme 1024 bit key of RSA can provide the same security
Security strength like 160 bit key size of ECC.
analysis of
Awasthi’s ECC is highly recommended for embedded and wireless
scheme
devices for its minimal key size and reduced computational
Proposed
eUASBP
cost [1].
Security
ECC is the next generation of public key cryptography, and
Analysis of based on currently understood mathematics
eUASBP
Elliptic Curve equation : y 2 = x3 –ax + b
Results and
Analysis
Trap door Function of ECC
Other Starting from the generator point, finding the new point
Advantages repeatedly till the end point using dot function.
Conclusion Basic operations – point addition and doubling
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 4 / 31
Introduction continued.,
Outline
Point Addition
Introduction
Related Work
Motivation
Awasthi’s
If 2 points are given (P,Q)
Scheme
Starting at P:
Security
analysis of P dot Q = -R (Draw a line
Awasthi’s
scheme from P to Q and it
Proposed
eUASBP
intersects at -R)
Security Reflect across the X axis
Analysis of
eUASBP from -R to R
Results and
Analysis
Other
Advantages
Public Key: Starting Point , Ending Point
Conclusion
Introduction
Awasthi’s
Scheme
Security
analysis of If only one point is given (P)
Awasthi’s
scheme Starting at P:
Proposed
eUASBP P dot P = -R (Tangent
Security line of P)
Analysis of
eUASBP Reflect across the X axis
Results and
Analysis
from -R to R
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 6 / 31
Introduction continued.,
Outline
Pairing Based Cryptography
Introduction
Introduction
Security
Smart Card based applications
Analysis of
eUASBP
identity card of an employee/a student
ATM card for banking
Results and
Analysis citizen card of a nation
Other purchase card of a company
Advantages
wireless sensor network based applications
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 8 / 31
Related Work
Outline
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 9 / 31
Related Work Continued.,
Outline
Introduction
Related Work
Motivation Notations:
Awasthi’s
Scheme Tbp : Bilinear pairing operation
Security
analysis of Te : Exponentiation operation
Awasthi’s
scheme Th : Hash operation
Proposed
eUASBP Tm : Multiplication operation
Security Tpm : Scalar point multiplication operation
Analysis of
eUASBP
TEPpub : Public key encryption operation
Results and
Analysis TEs : Public key decryption operation
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 10 / 31
Motivation and Objectives
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme Motivation and Objectives
Security Many authentication schemes for smart card based
analysis of
Awasthi’s authentication have been proposed.
scheme
Password based protection is provided in addition.
Proposed
eUASBP
To identify the pitfalls of Awasthi’s Scheme [5].
Security
To provide better Bilinear pairing based authentication
Analysis of scheme that eliminates all possible attacks.
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 11 / 31
Awasthi’s Scheme
Outline
Introduction
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 12 / 31
Awasthi’s Scheme Continued.,
Outline
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 13 / 31
Awasthi’s Scheme Continued.,
Outline User Verification: On receiving < IDx , Cx , Dx , Tx >, RS
Introduction
computes the following to verify the User/Client X.
Related Work
Format of the IDx is checked, if it is in a valid format
Motivation
then the following are done.
Awasthi’s
Scheme If (Tx∗ − Tx ) ≤ ∆T ,
Security (Tx∗ - Present timestamp of the RS)
analysis of
Awasthi’s (∆T – Allowed transmission delay )
scheme
Then MRS = EsK (Cx )
Proposed
eUASBP NRS = MRS .Ppub are computed.
Security If eb(Dx − NRS , RP ) = eb(hf1 (IDx ), Ppub )T
Analysis of
eUASBP Then the User/Client X is accepted by the RS, else
Results and rejected.
Analysis
Password Change Request: By receiving existing user
Other
Advantages identity, password and a new password, RS ensures the
Conclusion user/client X by using existing identity and password as
Publications mentioned in the steps 3 and 4. And RS makes a new
References
registration by using existing identity and a new password
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 14 / 31
Security analysis of Awasthi’s scheme
Outline
Introduction
Related Work
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 15 / 31
Proposed eUASBP
Outline
Introduction
Related Work
Motivation
Security
analysis of
Initialization Phase
Awasthi’s
scheme User’s Registration Phase
Proposed
eUASBP
User’s Login Phase
Security User’s Authentication Phase
Analysis of
eUASBP Password Change Phase : Similar to Awasthi’s Scheme
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 16 / 31
Proposed eUASBP Continued.,
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Proposed
eUASBP
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 17 / 31
Proposed eUASBP Continued.,
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Proposed
eUASBP
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 18 / 31
Proposed eUASBP Continued.,
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Proposed
eUASBP
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 19 / 31
Proposed eUASBP Continued.,
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Proposed
eUASBP
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 20 / 31
Security Analysis of eUASBP
Outline
Security
Informal Security analysis
Analysis of Off-line Password Guessing Attack
eUASBP
Privileged Insider Attack
Results and
Analysis User Impersonation Attack
Other Theft Attack
Advantages
Server Masquerading Attack
Conclusion Smartcard Stolen Attack
Publications Session key discloser attack
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 21 / 31
Performance comparison of eUASBP with other
Outline
existing Schemes
Introduction
Table: Comparison of Computational cost and attacks possibility of
Related Work
proposed eUASBP with related schemes
Motivation
Awasthi’s
Schemes Das et Fang et Giri and Awasthi’s Jia et Bayat et Proposed
Scheme
al. al.
Security [2] al. [3] Srivastava [5] al. [6] [7] eUASBP
analysis of [4]
Awasthi’s Login 2Tpm + 1Tpm + 3Tpm + 3Tpm + 4Tpm + 3Th + 3Th +
scheme 1Th 1Th + 1TE 1TE 1Th 2Tpm 1Tm +
Ppub Ppub
1TE 2Tpm
Ppub
Proposed
Verification 2Tbp + 2Tbp + 2Tbp + 2Tbp + 2Tbp + 5Th + 7Th +
eUASBP
1Tpm 1TEs 1Tpm + 1Tpm + 2Tpm + 2Tbp + 1Te +
Security 1TEs 1TEs 1Th 4Tpm + 3Tm +
Analysis of 1Tm 1Tbp +
eUASBP 2Tpm
√ √
A1 X X X X X
Results and √ √
A2 X X X X X
Analysis √ √
A3 X X X X X
√ √
A4 X X X X X
Other √ √
Advantages MA X X X X X
√
SK X X X X X X
Conclusion √ √
EPD X X X X X
Note that, A1: Resist user impersonation attack, A2: Resist off-line password guessing attack, A3: Resist
Publications
insider attack, A4: Resist smartcard stolen attack, MA: Mutual authentication, SK: Session key agreement,
√
References EPD: Early wrong password detection, : Can be mounted or satisfied, X: Cannot be mounted or not
satisfied.
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 22 / 31
Performance comparison of eUASBP with other
Outline
existing Schemes Continued.,
Introduction
Related Work
Motivation
Awasthi’s
Notations:
Scheme
Security
Tm : Multiplication operation
Analysis of
eUASBP Tpm : Scalar point multiplication operation
Results and TEPpub : Public key encryption operation
Analysis
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 23 / 31
Performance comparison of eUASBP with other
Outline
existing Schemes continued.,
Introduction
Related Work
Motivation
Table: Communication and Storage cost of authentication schemes
Awasthi’s
Scheme with eUASBP
Security
analysis of Cost Storage Communication(in bits)
Awasthi’s
scheme Entity (in bits) Smartcard Server
Schemes Login Verification
Proposed
eUASBP
Phase Phase
Das et al. [2] 576 704 -
Security
Analysis of
Fang et al. [3] 832 1344 -
eUASBP Giri and Srivastava [4] 1088 1472 -
Results and
Jia et al. [6] 1088 704 -
Analysis Awasthi [5] 832 1472 -
Bayat et al. [7] 1344 768 1472
Other
Advantages Proposed eUASBP 1152 704 512
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 24 / 31
Performance comparison of eUASBP with other
Outline
existing Schemes continued.,
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Proposed
eUASBP
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 25 / 31
Performance comparison of eUASBP with other
Outline
existing Schemes continued.,
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Proposed
eUASBP
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 26 / 31
Other advantages of proposed eUASBP
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 27 / 31
Conclusion
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of eUASBP performs better than the state of art
Awasthi’s
scheme Has additional benefits
Proposed
eUASBP Future plan is to add biometric based protection
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 28 / 31
Publications
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme International Journals
Security Paper titled “eUASBP : enhanced User Authentication Scheme based
analysis of
Awasthi’s
on Bilinear Pairing” in Journal of Ambient Intelligence and Humanized
scheme Computing, Springer. Accepted for Publication.
Paper titled ”ERMAP : ECC based Robust Mutual Authentication Pro-
Proposed
eUASBP tocol for Smart Grid Communication with AVISPA Simulations”, Under
Review in Journal of Ambient Intelligence and Humanized Computing,
Security
Analysis of Springer.
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 29 / 31
References
Outline
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 30 / 31
Outline
Introduction
Related Work
Motivation
Awasthi’s
Scheme
Security
analysis of
Awasthi’s
scheme
Thank You
Proposed
eUASBP
Security
Analysis of
eUASBP
Results and
Analysis
Other
Advantages
Conclusion
Publications
References
406913002 : Ph.D. Seminar Talk - I First Seminar Talk - Sep. 2019 September 9, 2019 31 / 31