To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Dissertation Chapters | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

A user and a server, who exchange their data or messages by using cryptographic key as well as sharing the password and authenticate with each other, this is the primary approach for password-Authenticated Key Exchange (PAKE). In the existing work, there are dualistic solutions for two-server PAKE either symmetric or asymmetric. In this it presents asymmetric solution for two-server PAKE, where a user can create various cryptographic solutions to the two servers. The current asymmetric two-server PAKE protocols are used in parallel computation. The proposed work extends the model by imposing different levels of trust upon the two servers, and generates a unique method at the technical level in the designing of protocol. As a result, we propose a practical two-server password authentication and key exchange system that is secure against offline dictionary attacks by servers when they are controlled by adversaries. Our proposed scheme is, a password-only system in the sense that it requires no public key cryptosystem and, no PKI. In the proposed system it introduced the new technique which is TTP (i.e., Trusted Third Party) server where, a users data will be passed on to the TTP server via web-service access in SOAP protocol by using the TPS i.e., Transaction Processing System and then the true encrypted data will send it to both the servers. The paper work, generalize the single back-end server architecture for basic two server model to supports the multiple front-end servers and for the federated enterprises of envision interesting applications. In the authentication system, to provide the more security we use SMS integration API for two step verification like Gmail.

Keywords: Password-authenticated key exchange PAKE, Diffie-Hellmen key exchange, ElGamal encryption, SOAP, TPS, Two-Step Verification

Edition: Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

Share this Article

How to Cite this Article?

Sonal Chandrakant Pansare, V. S. Nandedkar, "To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB156752, Volume 4 Issue 7, July 2015, 1716 - 1720

78 PDF Views | 69 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'ElGamal encryption'

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 12 - 16

Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem

Srishti Sharma

Share this Article

Similar Articles with Keyword 'SOAP'

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 495 - 500

Web Service Application to Access Climate Data from Cloud using Spring Framework

Vijayshree, Dr. Rekha Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 635 - 637

Survey Paper on Web Services in IOT

Jyoti L. Khachane, Latika R. Desai

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Similar Articles with Keyword 'TPS'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1742 - 1746

An Analytic Research on HTTP ,Web Servers, Web-Services & Efficient DNS Querying

Shaik Khaja Hafeezuddin, P.V.S.Srinivas

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2178 - 2183

Protection of Server from Proxy-Based DDoS Attack

Poonam U. Patil, Dr. Y. V. Chavan

Share this Article
Top