Ravi Singh Pippal

Learn More
Recently smart card authentication scheme based on symmetric key encryption is proposed. It provides mutual authentication between user and server and generates a session key. Its security depends on the one-way hash function and symmetric cryptosystem. It has been claimed that the scheme is secure and provides mutual authentication. In addition, it(More)
With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used.(More)
In Internet Protocol Television (IPTV) broadcasting, service providers charge subscription fee by scrambling the program in Conditional Access System (CAS). This avoids unauthorized users to receive the programs. A smart card (CA card) is used to decrypt the Control Words (CWs) and transfer them back to Set-Top Box (STB) in order to descramble the scrambled(More)
In the present Internet age, one of the main challenging tasks is to provide confidentiality for user's transaction. Various authentication schemes have been proposed to secure the data from unauthorized users. One of the most prominent schemes is password based smart card authentication scheme used to withstand the possible attacks for verification table.(More)
Cloud computing is a recently developed technology for complex systems with services sharing among various registered users. Therefore, proper mutual authentication is needed between users and cloud server prior to avail the services provided by cloud servers. Recently, Hao et al. [26] proposed time-bound ticketbased mutual authentication scheme for cloud(More)
Recently, Tsai et al. proposed dynamic ID based smart card authentication scheme. This paper demonstrates that Tsai et al.’s scheme fails to provide early wrong password detection, secure password change and protection against insider attack. To overcome, we propose a secure SCAM (Smart Card based Authentication Mechanism) which keeps all previous merits(More)
In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart(More)
The goal of this paper is to design a mutual authentication scheme that supports secure data service migration among multiple registered devices (like PC, Laptop, Smartphone, etc.) so that each user can use the most suitable device whenever he/she feels. Authentication based on single factor depends on user's knowledge of some secret i.e. a password or a(More)