Download now Free registration required
The rapid growth of electronic commerce and Internet-based applications demands strong privacy protection and robust system security, which are essential requirements for an authentication scheme or access control mechanism. The issue of remote user authentication has received much attention recently. Password authentication is one of the most convenient authentication mechanisms. Most of the presented remote user authentication schemes utilize time stamping in the authentication process, which requires accurate time synchronization. Because it would be very beneficial to overcome the insufficiencies of such schemes regarding the need for accurate time synchronization, in this paper, the authors present a new algorithm that uses two different types of hash functions, which come with a nested hashing chain and utilize the discreet logarithm problem in message exchange.
- Format: PDF
- Size: 249.28 KB