International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 112

Dissertation Chapters | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015


To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar


Abstract: A user and a server, who exchange their data or messages by using cryptographic key as well as sharing the password and authenticate with each other, this is the primary approach for password-Authenticated Key Exchange (PAKE). In the existing work, there are dualistic solutions for two-server PAKE either symmetric or asymmetric. In this it presents asymmetric solution for two-server PAKE, where a user can create various cryptographic solutions to the two servers. The current asymmetric two-server PAKE protocols are used in parallel computation. The proposed work extends the model by imposing different levels of trust upon the two servers, and generates a unique method at the technical level in the designing of protocol. As a result, we propose a practical two-server password authentication and key exchange system that is secure against offline dictionary attacks by servers when they are controlled by adversaries. Our proposed scheme is, a password-only system in the sense that it requires no public key cryptosystem and, no PKI. In the proposed system it introduced the new technique which is TTP (i. e. , Trusted Third Party) server where, a users data will be passed on to the TTP server via web-service access in SOAP protocol by using the TPS i. e. , Transaction Processing System and then the true encrypted data will send it to both the servers. The paper work, generalize the single back-end server architecture for basic two server model to supports the multiple front-end servers and for the federated enterprises of envision interesting applications. In the authentication system, to provide the more security we use SMS integration API for two step verification like Gmail.


Keywords: Password-authenticated key exchange PAKE, Diffie-Hellmen key exchange, ElGamal encryption, SOAP, TPS, Two-Step Verification


Edition: Volume 4 Issue 7, July 2015,


Pages: 1716 - 1720


How to Cite this Article?

Sonal Chandrakant Pansare, V. S. Nandedkar, "To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB156752, Volume 4 Issue 7, July 2015, 1716 - 1720

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'ElGamal encryption'

Downloads: 121

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article

Downloads: 180 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 12 - 16

Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem

Srishti Sharma

Share this Article

Similar Articles with Keyword 'SOAP'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 105

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

Similar Articles with Keyword 'TPS'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1167 - 1172

Protection against Multi-Id Generation Autobots/Botnets Using Using Colored Visually Encoded OTPs Generated by the Random Function in the Spherical Space

Taranpreet Kaur, Harmandeep Singh

Share this Article

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1742 - 1746

An Analytic Research on HTTP ,Web Servers, Web-Services & Efficient DNS Querying

Shaik Khaja Hafeezuddin, P.V.S.Srinivas

Share this Article

Similar Articles with Keyword 'key'

Downloads: 117 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Similar Articles with Keyword 'exchange'

Downloads: 3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1292 - 1297

Supply Chain Using Blockchain (Healthcare Industry)

Prof. Mangesh G. Ingale, Shyam Jamman Parmeshwar, Yash G. Purohit, Divyani Sable, Vishaksha Kachane

Share this Article

Downloads: 98

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Similar Articles with Keyword 'PAKE'

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Downloads: 121

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article
Top