Abstract:
User authentication is most essential to prevent the unauthorized adversaries from obtaining the system resources. This paper proposes a cellular automata based remote-us...Show MoreMetadata
Abstract:
User authentication is most essential to prevent the unauthorized adversaries from obtaining the system resources. This paper proposes a cellular automata based remote-user authentication (CARA) scheme to reduce the complexity of encryption and hash-based cryptosystems. CARA uses cache-based nonce to avoid synchronization problems and thwart replay attacks. This scheme is robust against other attacks as well. The inherent parallelism of cellular automata provides for its fast implementation
Date of Conference: 08-12 January 2006
Date Added to IEEE Xplore: 07 August 2006
Print ISBN:0-7803-9575-1
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cellular Automata ,
- Authentication Scheme ,
- Replay Attacks ,
- User Authentication ,
- Cell State ,
- Tungsten ,
- Global Status ,
- State Machine ,
- Hash Function ,
- Efficient Implementation ,
- Static Configuration ,
- Local Rules ,
- Clock Cycles ,
- Service Requests ,
- Smart Card ,
- Registration Phase ,
- Authentication Protocol ,
- Previous Configuration
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Cellular Automata ,
- Authentication Scheme ,
- Replay Attacks ,
- User Authentication ,
- Cell State ,
- Tungsten ,
- Global Status ,
- State Machine ,
- Hash Function ,
- Efficient Implementation ,
- Static Configuration ,
- Local Rules ,
- Clock Cycles ,
- Service Requests ,
- Smart Card ,
- Registration Phase ,
- Authentication Protocol ,
- Previous Configuration