IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
View Sample PDF
Author(s): Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK), Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Laleh Golafshan (Department of Computer Engineering and IT, Science and Research Branch, Islamic Azad University, Fars, Iran) and Mona Taghavi (Department of Computer, Science and Research Branch, Islamic Azad University, Tehran, Iran)
Copyright: 2011
Volume: 5
Issue: 3
Pages: 18
Source title: International Journal of Information Security and Privacy (IJISP)
Editor(s)-in-Chief: Li Yang (University of Tennessee at Chattanooga, USA) and Dalei Wu (University of Tennessee at Chattanooga, USA)
DOI: 10.4018/ijisp.2011070101

Purchase

View Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card on the publisher's website for pricing and purchasing information.

Abstract

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.

Related Content

A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security
Ranjeet Kumar Singh, Dilip Kumar Shaw. © 2018. 12 pages.
View Details View Details PDF Full Text View Sample PDF
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification
Gautam Kumar, Hemraj Saini. © 2018. 16 pages.
View Details View Details PDF Full Text View Sample PDF
CIAS: A Comprehensive Identity Authentication Scheme for Providing Security in VANET
Arun Malik, Babita Pandey. © 2018. 13 pages.
View Details View Details PDF Full Text View Sample PDF
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
Geetanjali Rathee, Hemraj Saini. © 2018. 11 pages.
View Details View Details PDF Full Text View Sample PDF
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN
Gulshan Kumar, Rahul Saha, Mandeep Singh, Mritunjay Kumar Rai. © 2018. 10 pages.
View Details View Details PDF Full Text View Sample PDF
Performance Evaluation of SHA-3 Final Round Candidate Algorithms on ARM Cortex–M4 Processor
Rajeev Sobti, Geetha Ganesan. © 2018. 11 pages.
View Details View Details PDF Full Text View Sample PDF
A Proposed SOAP Model in WS-Security to Avoid Rewriting Attacks and Ensuring Secure Conversation
Rajni Mohana. © 2018. 15 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom