期刊文献+

基于RSA算法动态相互身份认证的设计 被引量:2

Design of dynamic mutual identity authentication based on RSA algorithm
下载PDF
导出
摘要 针对安全的网络通信中相互身份认证困难的问题,提出了一种基于RSA算法的身份认证方案,该方案不仅能实现通信双方相互认证,而且每次认证的秘密信息可动态改变.另外,与其他基于公钥体制的身份认证方案相比,具有安全性更高、方便简洁、认证时间更少等优点,并通过VC++实现了基于该方案的系统. With the development of the Internet technology, more and more information spread in network. Everyone must testify his own identity by the certain form of identity authentication, and then different customers can mutually visit in security in the network. An authentication scheme based on the RSA eneryption is provided in order to solve the difficulty of the identity authentication in the communication network. This scheme can not only realize the mutual authentication of the communication sides. hut also the secret information in authentication can change. Compared with the other schemes based on public key, it has such advantages as. higher safety, convenience, simplicity and less, authentication time. The system based on the scheme has been realized by VC++.
出处 《安徽工程科技学院学报(自然科学版)》 2006年第1期29-33,共5页 Journal of Anhui University of Technology and Science
基金 安徽省教育厅科研基金资助项目(2005kj065)
关键词 密码体制 RSA算法 身份认证 公钥 cryptosystem RSA algorithm identity authentication public key
  • 相关文献

参考文献4

二级参考文献9

  • 1[1]All About Mondex. http://www.mondex.com, 2003-02-17
  • 2[2]Boy J P, Bosselaers A, Cramer R, et al. The ESPRIT Project CAFE, High Security Digital Payment Systems. Third European Symposium on Research in Computer Security, LNCS 875. Berlin: Springer-Verlag, 1994: 217-230
  • 3[3]Shamir A. Identity-based Cryptosystems and Signature Schemes. Proceedings of CRYPTO84. Berlin, Heidelberg, New York: Spring- Verlag, 1985: 47-53
  • 4JessGarms DanielSomerfield.Professional JAVA Security[M].北京:电子工业出版社,2002..
  • 5MohanAtreya 等.数字签名[M].北京:清华大学出版社,2003..
  • 6杨明 谢希仁.密码编码学与网络安全,原理与实践(第二版)[M].北京:电子工业出版社,2001..
  • 7AndrewNash WillianDuane etal.PKI:Implementing and Managing E-Security[M].北京:清华大学出版社,2002..
  • 8孟博,熊丽,陈浩然.基于PKI的电子商务安全研究[J].计算机工程与应用,2002,38(11):237-239. 被引量:18
  • 9沈涛,马红光,薛文通.网络数据加密算法研究及其应用[J].计算机工程与应用,2002,38(19):156-158. 被引量:10

共引文献44

同被引文献11

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部