Security

An Enhanced Remote Authentication Scheme Using Secure Key Exchange Protocol With Platform Integrity Attestation

Download Now Free registration required

Executive Summary

Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce are dependent on remote authentication schemes to validate user legitimacy in order to fulfill the authentication process. Unfortunately, these schemes are not able to provide trust or evidence of claimed platform identity. Therefore, these schemes are vulnerable to malicious software attacks that could compromise the integrity of the platform used for the communication.

  • Format: PDF
  • Size: 279.9 KB