360 likes | 372 Views
Authentication Protocols for E-Commerce Applications ( 認證協定在電子商務上之應用 ). 指導教授: Chin-Chen Chang 張真誠博士 博士生 : Jen-Ho Yang 楊仁和 Department of Computer Science and Information Engineering, National Chung Cheng University June 11, 2009. Outline. Introduction
E N D
Authentication Protocols for E-Commerce Applications (認證協定在電子商務上之應用) 指導教授: Chin-Chen Chang張真誠博士 博士生: Jen-Ho Yang楊仁和 Department of Computer Science and Information Engineering, National Chung Cheng University June 11, 2009
Outline • Introduction • An efficient ID-based mutual authentication protocol in mobile environments • An efficient authentication with key agreement protocol for sensor networks • Non-signature authenticated encryption scheme on elliptic curve cryptosystems • An fair electronic payment system based upon non-signature authenticated encryption scheme • Conclusions and future works
Introduction (1/3) User Authentication: • Personal Identification • Authentication Authentication Methods: • Biometrics: fingerprint, hand geometry, voiceprint, etc. • Cryptography: password, symmetric cryptosystems, public key cryptosystems, etc.
Introduction (2/3) Our Research Directions: • Authentication protocols for limited-power and low computational ability devices (mobile devices and sensor networks) • Authentication protocols for e-commerce applications • Practical and efficient electronic payment model
Introduction (3/3) • An efficient ID-based mutual authentication protocol in mobile environments (modular-exponentiation-based) • An efficient authentication with key agreement protocol for sensor networks (hash-function-based) • A non-signature authenticated encryption scheme on elliptic curve cryptosystems (ECC-based) • An fair electronic payment system based upon non-signature authenticated encryption scheme
An Efficient ID-Based Mutual Authentication Protocol in Mobile Environments (1/5) Disadvantages of Public Key Cryptosystems: • Trusted key authentication center • Correctness of user’s public key • Certificate • Additional computations for verifying certificate ID-based Cryptosystems
An Efficient ID-Based Mutual Authentication Protocol in Mobile Environments (2/5) ID-Based Cryptosystem (Shamir, 1984): • Using an unique identification (ID) as a public key • No public key • No public key table • No certificate • No key authentication center
An Efficient ID-Based Mutual Authentication Protocol in Mobile Environments (3/5) Notations of the Proposed ID-Based Protocol: TA: A trusted authority for initializing the system parameters System Parameters: p1, p2, p3, p4: four primes e, N: two public integers, where N = p1.p2.p3.p4 d: a secret integer satisfying IDm / IDb: the identity of mobile device / base station Sm/ Sb : the private keys of the mobile device/base station satisfying T: a time stamp h(·): a secure one-way hash function
An Efficient ID-Based Mutual Authentication Protocol in Mobile Environments (4/5) Mobile Device Base Station
An Efficient ID-Based Mutual Authentication Protocol in Mobile Environments (5/5) The Advantages of Our Protocol: • Preventing well-known attacks • Mutual authentication • Low computation loads for mobile device
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (1/9) Sensor Networks: • A wireless network which is composed of many sensors. • The sensor is characterized by limited power supply, low computation ability, and small memory size. • Sensor networks can be used for battlefield, medical devices, home monitoring, etc.
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (2/9) IEEE 802.15.4 defines two physical devices for sensor networks: • Full-Functional Device (FFD) e.g. a sensor, coordinator, router or security manager • Reduced-Functional Device (RFD) e.g. a sensor (end device) • There is a base station (BS) which initializes and preloads the system parameters for FFD and RFD
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (3/9) The System Model: :FFD :RFD Base Station
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (4/9) Authentication with Key Agreement (AKA) Protocols: • Authentication + session key agreement • Authentication: verifying the validity of the sensors • Session key agreement: encrypting the collected data • AKA can be applied to secure communications on sensor networks.
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (5/9) Previous AKA Protocols for Sensor Networks: • Based upon public key cryptosystems • Heavy computation load and high power overhead for sensor networks The Proposed Protocol: • Based on one-way hash functions and XOR operations • Efficient and practical for the sensor networks
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (6/9) Initializing Phase: Base station selects the following parameter for sensors: • h(.): a secure one-way hash function pre-stored in all sensors • x: a long-term secret key pre-stored in FFD • h(IDi x): a long-term secret key pre-stored in RFD
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (7/9) Authentication with Key Agreement Phase: RFD FFD
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (8/9) Authentication with Key Agreement Phase: RFD FFD
An Efficient Authentication with Key Agreement Protocol for Sensor Networks (9/9) The Advantages of Our Scheme: • Low power requirement • Fast processing time • Small communication overhead
Non-Signature Authenticated Encryption Scheme On Elliptic Curve Cryptosystems (1/6) Message Authentication and Confidentiality Conventional Method: Signature-then-encryption Symmetric encryption Signing Digital signature with message Message Cipher text Decryption-then-verifying Symmetric decryption Verifying Cipher text Message Digital signature Heavy computation cost
Non-Signature Authenticated Encryption Scheme On Elliptic Curve Cryptosystems (2/6) Authenticated Encryption Scheme: Signature + encryption = Signcryption Signcryption Cipher text with digital signature Message Verifying + decryption = Unsigncryption Cipher text with digital signature Unsigncryption Message
Non-Signature Authenticated Encryption Scheme On Elliptic Curve Cryptosystems (3/6) Disadvantages of the Previous Authenticated Encryption Schemes: Requiring the digital signature for authentication Increasing the computation costs Our Solution: Non-signature authenticated encryption scheme on ECC
Non-Signature Authenticated Encryption Scheme On Elliptic Curve Cryptosystems (4/6) System Parameters: q : an odd large prime ECC equation: n : the order of the ECC equation Q : a public base point in ECC * : the point multiplication in ECC Ux / dx :x’s public/private key satisfying Ux = dx*Q m: the message Elliptic Curve Discrete Logarithm Problem (ECDLP): Giventwo points Q and P in Eq(a, b),it’s hard to find k satisfying Q = k * P.
Non-Signature Authenticated Encryption Scheme On Elliptic Curve Cryptosystems (5/6) Alice Bob
Non-Signature Authenticated Encryption Scheme On Elliptic Curve Cryptosystems (6/6) • Authentication and message encryption • Without digital signature scheme • Low computation loads for the sender and the receiver
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(1/9) Electronic Payment Models for E-Commerce: • Electronic cash • Electronic check • Electronic credit card
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(2/9) Synchronization Problem: • The payer wants to send the payment after he receives the goods. • The merchant wants to send the goods after he receives the payment. Who sends it first ?
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(3/9) Solutions of the Synchronization Problem of Previous Researches: • Synchronized transaction online • Additional computations for lots of verification equations Our Solution: A fair electronic payment system using non-signature authenticated encryption scheme
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(4/9) System Parameters: q : an odd large prime ECC equation: n : the order of the ECC equation Q : a public base point in ECC * : the point multiplication in ECC Ux / dx :x’s public/private key satisfying Ux = dx*Q T: a time stamp
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(5/9) Alice Merchant Bank
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(6/9) Alice Bank Record in its database
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(7/9) Alice Merchant Goods
An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(8/9) • The Properties of the Propose System: • No synchronization problem • Offline transaction • Privacy of buying information for the bank • Anonymity for the merchant • Low computation and communication loads
Electronic Credit Card Electronic Cash Electronic Check Our System Paying Time Pay-later Pay-before Pay-later Pay-before Online/Offline Online Both Both Offline Anonymity No Yes No Yes SynchronizationProblem Yes Yes Yes No Computation Cost Low High High Low Payment Tools Proprties An Efficient Electronic Payment System Using Non-Signature Authenticated Encryption Scheme(9/9) Comparisons:
Conclusions and Future Works • Reducing the computation load for ID-based authentication protocol • Applying the non-signature authenticated scheme for different applications in e-commerce • Investigating a new electronic payment model for mobile-commerce