Specification
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See Section 10 and Rule 13)
Title of invention:
SYSTEM AND METHOD FOR SECURE TRANSACTION OF DATA BETWEEN WIRELESS
COMMUNICATION DEVICE AND SERVER
Applicant
TATA Consultancy Services Limited A company Incorporated in India under The Companies Act, 1956
Having address:
Nirmal Building, 9th Floor,
Nariman Point, Mumbai 400021,
Maharashtra, India
The following specification particularly describes the invention and the manner in which it is to be performed.
FIELD OF THE INVENTION
This invention relates to the field of wireless communications. Particularly, this invention relates to a system and method for secure transaction of data between at least one wireless communication device and a server by using lightweight Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms.
BACKGROUND OF THE INVENTION
In the mobile and wireless communication, Authentication methods are generally used to gain network access. The communication server (either for mobile or wireless) which provides accessibility must have a set of processes and protocols to verify user's identity. There is a need of a standard way for verifying user's logon, monitoring user's network usage and customer billing. Currently there are standards and protocols that can fulfill the above criteria for Authentication, Authorization and Accounting (AAA) purposes. But some of them are not secure and their performance will not meet 3G mobile communication requirements.
However, the current mobile and wireless authentication mechanisms employ the usage of Certificates. The Authorization protocols must support some notion of a "charging certificate". These Certificates being heavy weight in size affect the performance of the Mobile Application. With the conservative standards set by many Institutions chiefly in the mobile banking sector there is a requirement for light weight protocols which help in ensuring optimum performance of mobile applications through wireless media.
Moreover, mobile and wireless devices, like smart phones, PDAs, cellular phones and Remote control systems, play an increasingly important role in the digital environment. The pervasive use of mobile and wireless devices brings new security and privacy risks and with the extensive use of mobile devices consumers continuously leave traces of their identities and transactions, sometimes even by just carrying the devices around in their pockets. Since providing true privacy is hard as hiding identity information is irrelevant as long as some other linkable information is associated with the messages, the usage of a light weight protocol will help provide effective solutions to a majority of mobile and wireless applications.
Some of the inventions which deal with providing systems and methods for secure transaction of data between at least one wireless communication device and a server are:
US Patent application 20090180612 by Leu et al teaches that an authentication method employing ECC. It is applicable to a mobile broadcast TV system having one or more head end systems, at least a transmitter, and at least a mobile set. The authentication method comprises at least one request message from mobile sets simultaneously or in a short period of time arriving at a head end system for authentication; manipulating each broadcast authentication message by ECC; manipulating each service request message by ECC and pairing operation; performing a mutual authentication between the head end system and mobile sets by ECC and pairing operation; and broadcasting one group of authentication messages to all the mobile sets of many requests arrived at the head end system simultaneously or in a short period of time for the same service.
United States Patent 7243232 by Vanstone et al teaches that a key establishment protocol that includes the generation of a value of cryptographic function, typically a hash, of a session key and public information. This value is transferred between correspondents together with the information necessary to generate the session key. Provided the session key has not been compromised, the value of the cryptographic function will be the same at each of the correspondents. The value of the cryptographic function cannot be compromised or modified without access to the session key.
United States Patent 7716482 by Jung et al teaches that a conference session key distribution method used in an ID-based cryptographic system includes selecting two different temporary secret keys, generating a message and generating session key generation variables using the temporary secret keys of a session initiating party. Only valid participating parties receive the session key generation variables. Each party determines the session shared key from the session key generation variables.
United States Patent 6658476 by Van C. Van teaches that a client-server protocol support list in the context of standard request-response protocols such as the HyperText Transport Protocol (HTTP). In one embodiment, a method includes receiving a request according to a predetermined transport protocol. In response to receiving the request, the method transmits a list of supported client-server protocols in order of server preference, in accordance with the predetermined transport protocol. In one embodiment, the request is an OPTIONS request under HTTP. In one embodiment, the list is not a complete list of the protocols supported by the server.
US Patent Application 20100031051 by Machani et al teaches that a method of authenticating and encrypting a client-server communication, comprising the steps of: a) generating a first one-time password (OTP1) and a second one-time password (OTP2) from a cryptographic token; b) generating an encryption key (K_ENC) and a MAC key (K-MAC) based on OTP2; c) preparing
and protecting the client data using K-ENC and K_MAC; d) sending a request message from the client to the server, the request message containing the protected client data, a cryptographic token identifier (TID) and OTP1; e) validating OTP1 at the server, and generating OTP2 at the server upon successful validation; f) deriving K_EMC and K_MAC from OTP2 at the server; g) processing the request message and generating result data h) encrypting the result data using K_ENC and creating a digest using K_MAC; i) sending the encrypted result data to the client; and i) decrypting the result data at the client using K_ENC and verifying the authenticity of the result data using K-MAC.
United States Patent 6189098 by Burton S. Kaliski, Jr. teaches that a protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a communications channel a message containing at least a part of a certificate encrypted with the server's public key or a secret session key. The server receives and processes the message to recover at least part of the certificate, verifies and accepts it as proof of the client's authenticity.
United States Patent Application 20070139527 by Brown et at teaches thai an elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
United States Patent Application 20060098819 by Zeng et al teaches that methods, devices and systems for generating a plurality of public keys from one private key with the same generator of a group. A public key cryptosystem is also disclosed for generating a plurality of anonymous public keys all of which relate to the same party used for secure communications. Those anonymous public keys are generated using the same generator from one single private key. With the invention, computation is reduced, memory can be saved and security level can be improved.
US Patent 6563928 by Vanstone et at teaches that a technique of validating the key exchange messages using ECC to prevent a man-in the middle attack.
None of the above mentioned prior arts provide a system and method for a lightweight and high speed certificateless extensible authentication protocols (EAPs), which occupy less memory space for storage, for mobile and wireless communications and also provide EAPs which are suitable for wireless communication devices enabled with 2G, 3G or 4G networks.
Thus, in the light of the above mentioned prior art, it is evident that, there is a need to system and method which:
• Solves Confidentiality, Authentication, Authorization and Accounting (CAAA) issues for mobile phones and wireless devices at an affordable cost;
• Provides a certificateless extensible authentication protocols (EAPs) for mobile and wireless communications;
• Provides two way authentication in comparison to the current one way authentication standards; and
• Provides extensible authentication protocols (EAPs) based on the ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) which are easy to deploy on existing wireless communication devices.
OBJECTIVES OF THE INVENTION
The primary object of the invention is to provide a system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost.
It is another objective of the invention to provide a method and system for a set extensible authentication protocols using ECC and SKE mechanisms. These protocols can be easily implemented into mobile and wireless communication devices.
It is yet another objective of the invention to provide a method and system of ECC and SKE based EAPs (through a permutation technique) which can avoid replay attacks.
It is another object of the invention to provide a certificateless extensible authentication protocols (EAPs) for mobile and wireless communications.
It is another object of the invention to provide a securely transfer of registry and provision of
consumer details over the communication network.
It is another object of the invention to provide a light weight security with better performance in comparison to the lower layer chip level security provided by 2G, 3G or 4G applications.
It is another object of the invention to provide a provision of two way authentication in comparison to the current one way authentication standards.
SUMMARY OF THE INVENTION
Before the present methods, and systems enablement are described, it is to be understood that this invention in not limited to the particular systems, and methodologies described, as there can be multiple possible embodiments of the present invention and which are not expressly illustrated in the present disclosures. It is also to be understood that the terminology used in the description is for the purpose of describing the particular versions or embodiments only, and is not intended to limit the scope of the present invention which will be limited only by the appended claims.
The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost.
A method, comprising: receiving, from a wireless communication device, a connection attempt to access a server; performing an authentication process using lightweight Extensible Authentication Protocols(EAPs) based on Elliptic Curve Cryptography (ECC) mechanism to facilitate the wireless communication device prior to being allowed access to the server, where the authentication process comprising the steps of: Sending client hello message by the wireless communication device to initiate the communication to the Server; generating a random number after receiving client hello message by the server and subsequently computing a resultant masking process of random number using the generated random number, Mask, a transaction ID matching hash function, wherein the Mask = 156-bits, encrypting a message with the resultant masking process of random number matching hash function, adding a nonce value for security with help of a public key of the wireless communication device using ECE Encryption algorithm and then sending the encrypted message to the wireless communication device by the server; retrieving the random number and the Mask matching hash function with help of a private key of the wireless communication device on the received encrypted message using ECE Decryption algorithm by the wireless communication device, subsequently splitting the random number and the Mask
and then verifying the values of the random number with the Nonce value for security and the resultant masking process of random number with hash function by the wireless communication device; generating and adding the signature with message having a resultant value by the wireless communication device, wherein the resultant value is obtained using permutation technique of the random number, with respect to its private key by using the ECDSA-163 algorithm and subsequently sending the resultant message to the server by the wireless communication device; verifying the signature of the received resultant message with help of a public key of the wireless communication device using ECDSA-163 algorithm by the server and subsequently retrieving the resultant value by using permutation technique of the random number by the server; and Sending the response after verifying the signature of the received resultant message to the wireless communication device by the server.
The invention also provides a light weight security with better performance in comparison to the lower layer chip level Security provided by 2G, 3G or 4G applications.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing summary, as well as the following detailed description of preferred embodiments, are better understood when read in conjunction with the appended drawings. For the purpose of illustrating the invention there is shown in the drawings example constructions of the invention; however, the invention is not limited to the specific methods and system disclosed. In the drawings:
Figure 1 illustrates the secure transaction of data using EAP Protocol based on ECC (Elliptic Curve Cryptography) mechanism between server and wireless communication device according to one embodiment of the invention.
Figure 2 illustrates the secure transaction of data using EAP Protocol based on SKE (Symmetric Key Encryption) mechanism-1 between server and wireless communication device according to one embodiment of the i nvention.
Figure 3 illustrates the secure transaction of data using EAP Protocol based on SKE (Symmetric Key Encryption) mechanism-2 between server and wireless communication device according to one embodiment of the invention.
Figure 4 illustrates flow diagram with performance by using lightweight EAP Protocols for secure transaction of data between wireless communication device and server.
DETAILED DESCRIPTION OF THE INVENTION
Some embodiments of this invention, illustrating all its features, will now be discussed in detail.
The words "comprising," "having," "containing," and "including," and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items.
It must also be noted that as used herein and in the appended claims, the singular forms "a," "an," and "the" include plural references unless the context clearly dictates otherwise. Although any systems and methods similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present invention, the preferred, systems and methods are now described.
The disclosed embodiments are merely exemplary of the invention, which may be embodied in various forms.
The Extensible Authentication Protocol (EAP) is an Internet standard that provides an infrastructure for network access clients and authentication servers (RFC 3748). It has applications in wireless networks and PPP connections. EAP does not specify the authentication mechanism itself but the way it is negotiated by the communicating parties. There are attacks due to no proper authentication protocols in EAP.
Accordingly, the present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost.
A method, comprising: receiving, from a wireless communication device, a connection attempt to access a server; performing an authentication process using lightweight Extensible Authentication Protocols(EAPs) based on Elliptic Curve Cryptography (ECC) mechanism to facilitate the wireless communication device prior to being allowed access to the server, where the authentication process comprising the steps of:
a) Sending client hello message by the wireless communication device to initiate the communication to the Server;
b) generating a random number after receiving client hello message by the server and subsequently computing a resultant masking process of random number using the generated random number, Mask, a transaction ID matching hash function, wherein the Mask = 156-bits, encrypting a message with the resultant masking process of random number matching hash function, adding a nonce value for security with help of a public key of the wireless communication device using ECE Encryption algorithm and then sending the encrypted message to the wireless communication device by the server;
c) retrieving the random number and the Mask matching hash function with help of a private key of the wireless communication device on the received encrypted message using ECE Decryption algorithm by the wireless communication device, subsequently splitting the random number and the Mask and then verifying the values of the random number with the Nonce value for security and the resultant masking process of random number with hash function by the wireless communication device;
d} generating and adding the signature with message having a resultant value by the wireless communication device, wherein the resultant value is obtained using permutation technique of the random number, with respect to its private key by using the ECDSA-163 algorithm and subsequently sending the resultant message to the server by the wireless communication device;
e) verifying the signature of the received resultant message with help of a public key of the wireless communication device using ECDSA-163 algorithm by the server and subsequently retrieving the resultant value by using permutation technique of the random number by the server; and
f) Sending the response after verifying the signature of the received resultant message to the wireless communication device by the server.
The present invention used ECC and SKE algorithms in the proposed EAP schemes. In the ECC as well SKE based EAPs, there is no certificates exchanged between wireless communication device and server. During the communication, a permutation technique (cubing a random number w.r.to a prime p = 2 mod 3)) is used between the wireless communication device and the server ends in order to avoid reply attack. The defined permutation: r → r3 = r3 mod p (where p = 2 mod 3) is a bijective map employed as a cruciai role in the proposed EAPs. There are three authentication protocols proposed below that will fulfill CAAA issues.
Figure 1 illustrates the secure transaction of data using EAP Protocol based on ECC (Elliptic Curve Cryptography) mechanism between server and wireless communication device according to one embodiment of the invention, A system 100 comprises a server 110 and a wireless communication device 120 are communicatively coupled with each other via communication
network; the communication network can be selected from the group of Wide area network (WAN), Local Area Network (LAN) or Metropolitan Area Networks (MAN), internet, intranet, etc and the wireless communication device 120 can be selected from one of the group of mobile handsets, smart phones, PDAs, cellular phones, or tiny devices and the wireless communication device enabled with 2G, 3G, or 4G networks. According to one exemplary embodiment of the invention, the wireless communication device 120 can be mobile phone.
A method of communication used in the above said system 100 comprising receiving, from at least one wireless communication device 120, a connection attempt to access a server 110; performing an authentication process using lightweight Extensible Authentication Protocol (EAP) based on the Elliptic Curve Cryptography (ECC) mechanism to facilitate the wireless communication device 120 prior to being allowed access to the server 110, wherein the said authentication process comprising the following steps:
In the first step, the wireless communication device 120 initiating the communication by sending client hello message to the server 110, wherein the client hello message includes a list of encryption algorithms that the wireless communication device 120 is prepared to use and some challenge data to be used to authenticate the server 110. The message contains the following fields:
CLIENT HELLO MESSAGE
Field Length
The message type (client hello) 8 bits
The SSL version number (currently 2) 16 bits
The length of the cipher list 16 bits
The length of the session identifier 16 bits
The length of the challenge data 16 bits
The cipher list variable
The session identifier 16< data < 32 bytes
The challenge data variable
The session identifier is used to match the current request with a previous one, avoiding the need for repeated authenticate and key exchange if two systems have frequent communication. When keys are selected the server 110 will cache these and, if the wireless communication device 120 provides a session identifier in the client hello message the server 110 will search the cache for
this session identifier. According to one exemplary embodiment of the invention, the message contains the above mentioned fields as well as additionally 'buffer memory' field having the length of 32 bits. The field and length of the client hello message can be varied based on the requirements.
In the second step, the server 110 generating a random number 'r' after receiving client hello message, according to one exemplary embodiment of the invention, the size of the random number V can be 100-bit and subsequently the server 110 computing a resultant masking process of random number { s = (r || Mask ) XoR Hash(Tr-lD)} using the generated random number 'r', Mask, a transaction ID by matching hash function, wherein the Mask = 156-bits; the server 110 encrypting a message with the resultant masking process of random number 's' by matching hash function, adding a nonce value for security with help of a public key 'PUB' of the wireless communication device 120 using an ECE Encryption algorithm and then the server 212 sending the encrypted message {y = ECEPUB(s), Hash(s), Nonce(r)} to the wireless communication device 120.
In the third step, the wireless communication device 120 retrieving the random number 'r' and the Mask { Hash(TrJD) XoR ECEk(y)} by matching hash function with help of a private key 'k' of the wireless communication device 120 on the received encrypted message using an ECE Decryption algorithm and subsequently the wireless communication device 120 splitting the random number 'r' and the Mask and then verifying the values of the random number with the Nonce value for security and the resultant masking process of random number 's' with hash function.
In the fourth step, the wireless communication device 120 generating and adding the signature {signs} with message having a resultant value 'm', wherein the resultant value 'm' { m = r3 mod p = a 137-bit number} is obtained using permutation technique of the random number 'r', with respect to its private key 'k' by using an ECDSA-163 algorithm and subsequently the wireless communication device 120 sending the resultant message {sig_value} to the server 110.
In the fifth step, the server 110 verifying the signature {sig_value} of the received resultant message with help of the public key 'PUB' of the wireless communication device 120 using ECDSA-163 algorithm and subsequently the server 110 retrieving the resultant value 'm' {r3 mod p }by using permutation technique of the random number 'r'.
In the final step, the server 110 sending the response after verifying the signature of the received resultant message to the wireless communication device 120.
Before initiating the communication in the above said system 100, initially, the server 110 registers the device and IMEI numbers of the wireless communication device 120 and then distributing customer identity and transaction identity (Cust-lD and Tr_ID) to each wireless communication devices 120 prior to being allowed access to the server 110. According to one exemplary embodiment of the invention, the wireless communication device 120 can be mobile phone, so the server 110 registers mobile and IMEI numbers and distributes customer identity and transaction identity (Cust-lD and Tr-D) to each mobiles 120 prior to being allowed access to the server 110 and the wireless communication device 120 using its private key 'k' of 163-bits for Elliptic Cryptography (EC) decryption and EC signature generation, using its public key 'PUB' for Elliptic Cryptography (EC) decryption and EC signature verification and a known Pseudo Random Number Generator (PRNG) which accepts a seed for generating the random numbers.
According to one embodiment of the invention, before initiating the communication in the above said system 100, initially an (Elliptic Curve Cryptography) ECc-163 set up is arranged between the wireless communication device and the server.
According ta one embodiment of the invention, the hash function is matched, in the above mentioned system and method, in order to maintain a secure communication to avoid phishing and replay attacks and according to another embodiment of the invention, the nonce value is added, in the above mentioned system and method, in order to maintain a secure communication to avoid phishing and replay attacks. Further, hashing and nonce methods are used to avoid Initial Counter Prediction and Time Memory Trade Off attacks.
Example of the secure transaction of data using EAP Protocol based on ECC (Elliptic Curve Cryptography) mechanism:
1. Tr-lD =35422
2. Hash(tr_ID) = 95405401234511
3. Prime number p = 101 where p is 2 mod 3
4. Wireless communication device's private key k = 199
5. Wireless communication device's public key PUB = (232, 123)
6. Server generates a random number r = 124325
7. Server computes s = 1243255783459321 XoR 95405401234511 = 1192391475877302, where Mask = 5783459321.
8. Server uses PUB and sends {(23241,34343), 3443221, 15} to the wireless communication device
9. Wireless communication device uses k on (23241, 34343) using EC Decryption and gets s from which the wireless communication device retrieves r = 124325.
10. Wireless communication device computes m = r3 mod p = 87, signs m w.r.to k using ECDSA-163 algorithm and sends the sig_value = {4547, 3434}to the server
11. Server computes m =r3 mod p = 87 and uses the public key of client for verifying the signature.
Figure 2 illustrates the secure transaction of data using EAP Protocol based on SKE (Symmetric Key Encryption) mechanism-1 between server and wireless communication device according to one embodiment of the invention. A system 200 comprises a server 210 and a wireless communication device 220 are communicatively coupled with each other via communication network, the communication network can be selected from the group of Wide area network (WAN), Local Area Network (LAN) or Metropolitan Area Networks (MAN), internet, intranet, etc and the wireless communication device 220 can be selected from one of the group of mobile handsets, smart phones, PDAs, cellular phones, or tiny devices and the wireless communication device enabled with 2G, 3G, or 4G networks. According to one exemplary embodiment of the invention, the wireless communication device 220 can be mobile phone.
A method of communication used in the above said system 200 comprising receiving, from at least one wireless communication device 120, a connection attempt to access a server 110; performing an authentication process using lightweight Extensible Authentication Protocol (EAP) based on the Symmetric Key Encryption (SKE) mechanism to facilitate the wireless communication device 220 prior to being allowed access to the server 210, wherein the said authentication process comprising the following steps:
In the first step, the wireless communication device 220 initiating the communication by sending client hello message to the server 210, wherein the client hello message includes a list of encryption algorithms that the wireless communication device 220 is prepared to use and some challenge data to be used to authenticate the server 210. The message contains the following fields:
CLIENT HELLO MESSAGE
Field Length
The message type (client hello) 8 bits
The SSL version number (currently 2) 16 bits
The length of the cipher list 16 bits
The length of the session identifier 16 bits
The length of the challenge data 16 bits
The cipher list variable
The session identifier 16 1 sec.
The preceding description has been presented with reference to various embodiments of the invention. Persons skilled in the art and technology to which this invention pertains will appreciate that alterations and changes in the described structures and methods of operation can be practiced without meaningfully departing from the principle, spirit and scope of this invention.
ADVANTAGES OF THE INVENTION
A system and method for a set of Extensible Authentication Protocols (EAPs) based on ECC (Elliptic Curve Cryptography) and SKE (Symmetric Key Encryption) mechanisms (with a suitable permutation) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost in accordance with this invention described above finds a number of applications in Mobile and Wireless communications. Some specific areas where our process can be applied are as follows:
1. Smart phones
2. Personnel Digital Assistant (PDA)
3. Mobile banking
4. Wireless devices
5. Set-Top Box
6. Remote control systems
7. Alarm systems
8. Mobile-to-mobile payment systems
WE CLAIM
1) A method, comprising: receiving, from a wireless communication device, a connection attempt to access a server; performing an authentication process using lightweight Extensible Authentication Protocols(EAPs) based on Elliptic Curve Cryptography (ECC) mechanism to facilitate the wireless communication device prior to being allowed access to the server, where the authentication process comprising the steps of:
a) Sending client hello message by the wireless communication device to initiate the communication to the Server;
b) generating a random number after receiving client hello message by the server and subsequently computing a resultant masking process of random number using the generated random number, Mask, a transaction ID matching hash function, wherein the Mask = 156-bits, encrypting a message with the resultant masking process of random number matching hash function, adding a nonce value for security with help of a public key of the wireless communication device using ECE Encryption algorithm and then sending the encrypted message to the wireless communication device by the server;
c) retrieving the random number and the Mask matching hash function with help of a private key of the wireless communication device on the received encrypted message using ECE Decryption algorithm by the wireless communication device, subsequently splitting the random number and the Mask and then verifying the values of the random number with the Nonce value for security and the resultant masking process of random number with hash function by the wireless communication device;
d) generating and adding the signature with message having a resultant va\ue by the wireless communication device, wherein the resultant value is obtained using permutation technique of the random number, with respect to its private key by using the ECDSA-163 algorithm and subsequently sending the resultant message to the server by the wireless communication device;
e) verifying the signature of the received resultant message with help of a public key of the wireless communication device using ECDSA-163 algorithm by the server and subsequently retrieving the resultant value by using permutation technique of the random number by the server; and
f) Sending the response after verifying the signature of the received resultant message to the wireless communication device by the server.
2) The method of claim 1, further comprising registering the device number and IMEi numbers of the wireless communication device by the server and distributing customer identity and
transaction identity to each wireless communication devices by the server prior to being allowed access to the server.
3) The method of claim 1, further comprising arranging an (Elliptic Curve Cryptography) ECC-163 set up between the wireless communication device and the server prior to being allowed access to the server.
4) The method of claim 1, further comprising using its private key for Elliptic Cryptography (EC) decryption and EC signature generation by the wireless communication device prior to being allowed access to the server.
5) The method of claim 1, further comprising using its public key for Elliptic Cryptography (EC) decryption and EC signature verification by the wireless communication device prior to being allowed access to the server.
6) The method of claim 1, wherein the wireless communication device can be selected from one of the group of mobiles, smart phones, PDAs, cellular phones or tiny devices and the wireless communication device enabled with 2G, 3G, and 4G networks.
7) The method of claim 1, wherein the hash function is matched in order to maintain a secure communication to avoid phishing attacks, replay attacks, Initial Counter Prediction attacks or Time Memory Trade Off attacks.
8) The method of claim 1, wherein the nonce value is added in order to maintain a secure communication to avoid phishing attacks, replay attacks, Initial Counter Prediction attacks or Time Memory Trade Off attacks.
9) A system comprising at least one wireless communication device and a server communicatively coupled with each other via communication network, wherein the wireless communication device attempt to access a server via the communication network, prior to being allowed access to the server, the wireless communication device performing an authentication process using lightweight Extensible Authentication Protocols(EAPs) based on Elliptic Curve Cryptography (ECC) mechanism, the said authentication process comprising the steps of:
a) the wireless communication device initiating the communication by sending client hello message to the server;
b) the server generating a random number after receiving client hello message and subsequently computing a resultant masking process of random number using the
generated random number, Mask, a transaction ID matching hash function, wherein the Mask = 156-bits, encrypting a message with the resultant masking process of random number matching hash function, adding a nonce value for security with help of a public key of the wireless communication device using ECE Encryption algorithm and then sending the encrypted message to the wireless communication device;
c) the wireless communication device retrieving the random number and the Mask matching hash function with help of a private key of the wireless communication device on the received encrypted message using ECE Decryption algorithm, subsequently the wireless communication device splitting the random number and the Mask and then verifying the values of the random number with the Nonce value for security and the resultant masking process of random number with hash function;
d) the wireless communication device generating and adding the signature with message having a resultant value, wherein the resultant value is obtained using permutation technique of the random number, with respect to its private key by using the ECDSA-163 algorithm and subsequently the wireless communication device sending the resultant message to the server;
e) the server verifying the signature of the received resultant message with help of a public key of the wireless communication device using ECDSA-163 algorithm and subsequently the server retrieving the resultant value by using permutation technique of the random number; and
f) the server sending the response after verifying the signature of the received resultant message to the wireless communication device.
10) The system of claim 9, further comprising the server registers the device number and IMEI numbers of the wireless communication device and then the server distributing customer identity and transaction identity to each wireless communication devices prior to being allowed access to the server.
11) The system of claim 9, further comprising an (Elliptic Curve Cryptography) ECC-163 set up is arranged between the wireless communication device and the server prior to being allowed access to the server.
12) The system of claim 9, further comprising the wireless communication device using its private key for Elliptic Cryptography (EC) decryption and EC signature generation prior to being allowed access to the server.
13) The system of claim 9, further comprising the wireless communication device using its public key for Elliptic Cryptography (EC) decryption and EC signature verification prior to being allowed access to the server.
14) The system of claim 9, wherein the wireless communication device can be selected from one of the group of mobiles, smart phones, PDAs, cellular phones or tiny devices and the wireless communication device enabled with 2G, 3G, and 4G networks.
15) The system of claim 9, wherein the hash function is matched in order to maintain a secure communication to avoid phishing attacks, replay attacks, Initial Counter Prediction attacks or Time Memory Trade Off attacks.
16) The system of claim 9, wherein the nonce value is added in order to maintain a secure communication to avoid phishing attacks, replay attacks, Initial Counter Prediction attacks or Time Memory Trade Off attacks.
17) A method, comprising: receiving, from a wireless communication device, a connection attempt to access a server; performing an authentication process using lightweight Extensible Authentication Protocols(EAPs) based on Symmetric Key Encryption (SKE) mechanism to facilitate the wireless communication device prior to being allowed access to the server, where the authentication process comprising the steps of:
a) Sending client hello message by the wireless communication device to initiate the communication to the Server;
b) Generating a random number and a prime number after receiving client hello message by the server and subsequently computing a resultant masking process of random number using the generated random number, Mask, a transaction ID, Customer ID, Device Number using hash function, a nonce value for security, wherein the Mask = 64-bits, encrypting a message with the resultant masking process of random number, a resultant masking value using hash function, a nonce value for security and sending an encrypted message to the wireless communication device by the server;
c) retrieving the random number and the Mask by using hash function on the received encrypted message by the wireless communication device, splitting the random number and the Mask, after recovering the prime number, then verifying hash value of the received resultant masking value, computing a resultant value, which is obtained using permutation technique of the random number, encrypting a message with a new second random number by matching hash function and further adding a nonce value for security and sending the resultant encrypted message to the server by the wireless communication device, wherein the second new random number is generated using the
Pseudo Random Number Generator (PRNG) method by the wireless communication device;
d) computing a cubing value of the random number by the server, subsequently getting the second new random number using the cubing value of the random number and XOR function, verifying hash value of the received message and Nonce value of the received resultant encrypted message by the server; and
e) Sending the response after verifying the hash value of the second new random number and Nonce value of the received resultant encrypted message to the wireless communication device by the server.
18) The method of Claim 17, wherein step (b) further comprising computing first resultant masking value using the generated random number by matching hash function, Maskl and other parameters by the server, wherein the Mask = 64-bits, second resultant masking value using generated random number by matching hash function, Mask2 and other parameters by the server, wherein the Mask = 64-bits , encrypting a message with the first resultant masking value and the prime number by matching hash function and adding a nonce value for security, second resultant masking value by the server and the step (c) further comprising retrieving the random number, and the Maskl by matching hash function on the received encrypted message by the wireless communication device, subsequently splitting the values of random number and the Maskl, after extracting the prime number, then verifying hash value of the received encrypted message with the extracted prime number, Nonce function with the first resultant masking value; computing a resultant value, which is obtained using permutation technique of the random number, generating a private key using the Deterministic Random Sequence Generation (DRSG) algorithm and encrypting a message with the cubing value of the random number and further adding a nonce value for security and sending encrypted message to the server by the wireless communication device and the step (d) further comprising retrieving the private key by cubing value of the random number, then getting a resultant value, which is obtained from XOR function of the private key with cubing value of the random number by the server, subsequently splitting the cubing value of the random number the private key and finally verifying the private key with Nonce value for security from the received encrypted message by the server and the step (e) further comprising sending the response after verifying the private key with Nonce value for security from the received encrypted message to the wireless communication device by the server.
19) The method of Claim 17, wherein registering the device number and IMEI numbers of the wireless communication device by the server and distributing customer identity and
transaction identity to each wireless communication devices by the server prior to being allowed access to the server.
20) The method of Claim 17, wherein encrypting the message by using AES-CTR-192-bit
algorithm.
21) The method of Claim 17, wherein the wireless communication device can be selected from one of the group of mobiles, smart phones, PDAs, cellular phones, cellular phones or tiny devices and the wireless communication device enabled with 2G, 3G, and 4G networks.
22) The method of claim 17, wherein the hash function is matched in order to maintain a secure communication to avoid phishing attacks, replay attacks, Initial Counter Prediction attacks or Time Memory Trade Off attacks.
23) The method of claim 17, wherein the nonce value is added in order to maintain a secure communication to avoid phishing attacks, replay attacks, Initial Counter Prediction attacks or Time Memory Trade Off attacks.
24) A system comprising at least one wireless communication device and a server communicatively coupled with each other via communication network, wherein the wireless communication device attempt to access a server via the communication network, prior to being allowed access to the server, the wireless communication device performing an authentication process using lightweight Extensible Authentication Protocols(EAPs) based on Symmetric Key Encryption (SKE) mechanism, the said authentication process comprising the steps of
a) the wireless communication device initiating the communication by sending client hello message to the server;
b) the server generating a random number and a prime number after receiving client hello message and subsequently the server computing a resultant masking process of random number using the generated random number, Mask, a transaction ID, Customer ID, Device Number using hash function, a nonce value for security, wherein the Mask = 64-bits, encrypting a message with the resultant masking process of random number, a resultant masking value using hash function, a nonce value for security and sending an encrypted message to the wireless communication device;
c) the wireless communication device retrieving the random number and the Mask by using hash function on the received encrypted message, subsequently the wireless communication device splitting the random number and the Mask, after recovering the prime number, then verifying hash value of the received resultant masking value,
computing a resultant value, which is obtained using permutation technique of the random number, encrypting a message with a new second random number by matching hash function and further adding a nonce value for security and sending the resultant encrypted message to the server, wherein the second new random number is generated using the Pseudo Random Number Generator (PRNG) method;
d) the server computing a cubing value of the random number, subsequently the server getting the second new random number using the cubing value of the random number and XOR function, verifying hash value of the received message and Nonce value of the received resultant encrypted message; and
e) the server sending the response after verifying the hash value of the second new random number and Nonce value of the received resultant encrypted message to the wireless communication device.
25) The system of Claim 24, wherein step (b) further comprising the server computing first resultant masking value using the generated random number by matching hash function, Maskl and other parameters, wherein the Mask = 64-bits, second resultant masking value using generated random number by matching hash function, Mask2 and other parameters, wherein the Mask = 34-bits, encrypting a message with the first resultant masking value and the prime number by matching hash function and adding a nonce value for security, second resultant masking value and the step (c) further comprising the wireless communication device retrieving the random number, and the Maskl by matching hash function on the received encrypted message, subsequently the wireless communication device splitting the values of random number and the Maskl, after extracting the prime number, then verifying hash value of the received encrypted message with the extracted prime number, Nonce function with the first resultant masking value, then computing a resultant value, which is obtained using permutation technique of the random number, generating a private key using the Deterministic Random Sequence Generation (DRSG) algorithm and the wireless communication device encrypting a message with the cubing value of the random number and further adding a nonce value for security and sending encrypted message to the server and the step (d) further comprising the server retrieving the private key by cubing value of the random number, then the server getting a resultant value, which is obtained from XOR function of the private key with cubing value of the random number, subsequently the server splitting the cubing value of the random number the private key and finally verifying the private key with Nonce value for security from the received encrypted message and the step (e) further comprising the server sending the response after verifying the private key with Nonce value for security from the received encrypted message to the wireless communication device.
26) The system of Claim 24, wherein by the server registers the device number and IMEI numbers of the wireless communication device and the server distributing customer identity and transaction identity to each wireless communication devices prior to being allowed access to the server.
27) The system of Claim 24, wherein encrypting the message by using AES-CTR-192-bit algorithm.
28) The system of Claim 24, wherein the wireless communication device can be selected from one of the group of mobiles, smart phones, PDAs, cellular phones, cellular phones or tiny devices and the wireless communication device enabled with 2G, 3G, and 4G networks.
29) The system of claim 24, wherein the hash function is matched in order to maintain a secure communication to avoid phishing attacks, replay attacks, Initial Counter Prediction attacks or Time Memory Trade Off attacks.
30) The system of claim 24, wherein the nonce value is added in order to maintain a secure communication to avoid phishing attacks, replay attacks, initial Counter Prediction attacks or Time Memory Trade Off attacks.
31) A method and system substantially as herein described with reference to and as illustrated by the accompanying drawings.