期刊文献+

一种智能卡口令认证方案的分析与改进 被引量:3

Analysis and Improvement of a Passwo rd Authentication Scheme with Smart Cards
原文传递
导出
摘要 袁,吕提出了一种智能卡口令认证方案。在他们的方案中,用户能随意更改口令,远程系统不需要存储用户的口令表或验证表,并能防止重放攻击。作者指出袁—吕方案不能抵抗假冒攻击,并进行了改进。 Yuan and Lüproposed a password auth en tication scheme with smartcards .I n their scheme users can change their passwo rds freely and the remote system does not need the directory o f passwords or ve rification tables,and replay attack can be avoided.In this paper ,the aut hor s show that the Yuan-Lüscheme can' t resist personate attack and propose an i m-provement that overcomes the secure leak .
出处 《通信技术》 2003年第8期104-105,共2页 Communications Technology
关键词 口令认证 智能卡 基于身份的方案 假冒攻击 password authenticati on,smart card,ID-based scheme,personate attac k
  • 相关文献

参考文献6

  • 1袁时金,吕丽民.智能卡口令认证方案[J].计算机工程与科学,2002,24(1):18-19. 被引量:1
  • 2[4]Evans A, Kantrowitz W, Weiss E. A User Authentication Scheme not Requiring Security in the Computer. Communication of the ACM,1974; 17 (8): 437 ~442
  • 3[5]Chang C C, Wu T C. Remote Password Authentication with Smart. IEE Proceeding- E, 1998; 138(3): 165 ~ 168
  • 4[6]Wang S J, Chang J F. Smart Card Based Secure Password Authentication Scheme. Computers and Security, 1999; 15 (3) :231 ~ 237
  • 5[7]Shamir A. Identity - Based Cryptosystems and Signature Schemes. Proc CRYPTO' 84, 1984:47 ~ 53
  • 6[8]Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signature and Public - Key Cryptosystem . Communications of the ACM, 1978;21(2): 120 ~ 126

二级参考文献7

  • 1[1]A Evans,W Kantrowitz,E Weiss. A User Authentication Scheme not Requiring Secrecy in the Computer [J]. Communication of the ACM, 1974, 17(8):437-442.
  • 2[2]C C Chang, T C Wu.Remote Password Authentication with Smart Cards[J]. IEE Proceeding-E, 1998,138(3):165-168.
  • 3[3]S J Wang, J F Chang. Smart Card Based Secure Password Authentication Scheme[J]. Computers and Security, 1999,15(3):231-237.
  • 4[4]A Shamir. Identiry-Based Cryptosystems and Signature Schemes[A]. Proc CRYPTO'84 [C].1984.47-53.
  • 5[5]P Peyret,G Lisimaque, T Y Chua.Smart Cards Provide Very High Security and Flexibility in Subscribers Management[J].IEEE Trans on Consumer Electronics, 1995,36(3):744-752.
  • 6[6]R L Rivest, A Shamir, L Adlemnan. A Method for Obtaining Digital Signature and Public-Key Cryptosystem[J]. Communications of the ACM, 1978,21(2):120-126.
  • 7[7]L Adleman. A Subexponential Algorithm for the Discrete Logarithm Problem with Applications to Cryptography[A]. Proc 20th IEEE Symp Foundations of Computer Science[C].1979.55-60.

同被引文献25

  • 1王元珍,冯超.数据库加密系统的研究与实现[J].计算机工程与应用,2005,41(8):170-172. 被引量:44
  • 2赖欣,阮志刚,彭代渊.基于公钥密码体制的3G认证协议改进[J].信息安全与通信保密,2006,28(5):104-105. 被引量:4
  • 3匡华清,谢冬青,夏峰.一种有密钥确认的安全认证密钥协商协议[J].信息安全与通信保密,2006,28(10):128-129. 被引量:2
  • 4腾讯网.CSDN详解600万用户密码泄露始末[EB/OL].(2011-12-21)[2013-05-10].http://tech.qq.com/a/2011122I/000485.htm.
  • 5腾讯网.天涯4000万用户密码遭泄露[EB/OL].(2011-12-25)[2013一05-10].http://tech.qq.com/a/20111225/000079.htm.
  • 6GILMORE W J. Beginning PHP and MySQL 5: From Novice to Professional[M].Germany: Springer, 2006: 70-85.
  • 7百度百科.数据库攻击方式总结[EB/OL].(2012-12-22)[2013-05-10].http://baike.baidu.tom/view/662394.htm.
  • 8CMD5公司.在线MD5查询[EB/OL].(2013-05-10)[2013-05-10].www.cmd5.tom.
  • 9酷壳网.如何防范密码被破解[EB/OL].(2010-02-01)[2013-05-10].http://coolshell.cn/articles/2078.html.
  • 10ISO/IEC 11770 -4 -2006, Information Technology-Securi- ty Techniques - Key Management - Part4: Mechanisms based on Weak Secrets [ S ]. [ s. 1. ]: Joint Technical Committee ISO/IEC JTC 1,2006.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部