Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem

  • P. Kumaraswamy Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
  • C.V. Guru Rao Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
  • V. Janaki Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
  • K.V.T.K.N. Prashanth Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
Keywords: Certificate, authentication, chinese remainder theorem, discrete logarithms, confidentiality, non-repudiation, public key cryptosystem

Abstract

Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposed
a new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. The
first drawback is the availability of users’ passwords in plaintext format in key server which are prone to attacks
by ill-minded users. The second one is depending on the key server blindly for certificate generation, without
further verification by the user. To overcome these severe drawbacks, we proposed an improved key authentication
scheme based on Chinese remainder theorem and discrete logarithms. Our scheme allows the user to generate his/
her certificate without the help of any trusted third party. This scheme is intended for online services, military and
defense applications to exchange keys securely.
 

Author Biographies

P. Kumaraswamy, Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
Mr P. Kumaraswamy, pursuing his PhD in Computer Science
and Engineering at JNT University, Hyderabad, Telangana, India.
He is an Assistant Professor in the Department of Computer
Science and Engineering, S.R. Engineering College, Warangal,
India. His research interest includes Cryptography, Information
security and Computer networks.
C.V. Guru Rao, Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
Dr C.V. Guru Rao, Received his PhD in Computer Science and
Engineering from IIT , Kharagpur, India. He is a professor in
Computer Science and Engineering, Department, S.R. Engineering
college Warangal. His research interests are related to Embedded
system, Computer networks, Information security and Data
Mining. A text book titled ‘The Design and Analysis of
Algorithms, 2e’ authored by Anany Levitin was adapted by
him in tune to the Indian standards and it was published by
Pearson Education India.
V. Janaki, Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
Dr V. Janaki, received her PhD in Computer Science and
Engineering from JNT University, Hyderabad, Telangana, India.
She is Professor and HOD of CSE Department, Vaagdevi
Engineering College, Warangal. Her research interest includes
network security, cryptography, image processing, biometrics,
pattern recognition.
K.V.T.K.N. Prashanth, Department of Computer Science and Engineering, S.R. Engineering College, Warangal - 506 371, India
Mr K.V.T.K.N Prashanth, pursuing his Master of Technology in
Computer Science and Engineering in the Osmania University,
Hyderabad, Telangana, India. He is a P.G. research scholar. His
research interest includes cryptography, information security
and Machine Learning.
Published
2016-10-31
How to Cite
Kumaraswamy, P., Rao, C., Janaki, V., & Prashanth, K. (2016). Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem. Defence Science Journal, 66(6), 590-593. https://doi.org/10.14429/dsj.66.9649
Section
Special Issue Papers