期刊文献+

一种适用于HOTP的一次口令生成算法 被引量:7

A one time password generation algorithm suitable for HOTP
下载PDF
导出
摘要 采用HMAC SHA-1杂凑函数和动态截短函数设计了一次性口令算法HOTP-C.该算法具有计算速度快、安全性高的特点,易于采用令牌或IC卡硬件实现.因此,该算法适用于HTOP认证架构.此外,提出了基于令牌的认证协议应具备的3个基本条件,并设计了一种基于计数器同步的认证协议.该协议通过在服务器端设置最大认证尝试次数来防止蛮力攻击,并设置前顾参数来实现计数器重同步.分析表明,该协议能够有效抵抗蛮力攻击和截获/重放消息等常见攻击,具有很高的安全性. A one time password algorithm HTOP.C is proposed based on HMAC SHA-1 and a dynamic truncating function. The algorithm has a fast computing speed and high security, and it is easy to implement by using Token or IC card hardware. Therefore, the algorithm is suitable for the HTOP authentication framework. Besides, three basic conditions are proposed for the token-based authentication protocol, and an authentication protocol based on counter synchronization is designed. At the server side, the protocol sets up a maximum trying number to prevent the brute-force attack, and a look-ahead parameter to realize counter resynchronization. Finally, the security of the protocol is analyzed. Results show that the protocol can resist normal attacks, such as brute-force attack and interception/replay attack effectively, and is highly secure.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2006年第4期650-654,共5页 Journal of Xidian University
基金 国家自然科学基金资助项目(60173056)
关键词 一次性口令 杂凑函数 认证协议 one time password hash function authentication protocol
  • 相关文献

参考文献5

  • 1Raihi D M. Internet Draft. VeriSign[EB/OL]. htpp://www.openauthentication. org/pdfs/draft-mraihi-nutual-oath-hotp-variants-00.pdf. 2005-10-10.
  • 2Willoughby M.OATH Swears Authentication is the Next Big Thing[EB/OL]. http://magazine.digitalidworld.com/Jan05/Page34. pdf, 2005-10-15.
  • 3Shi W D, Lee H H S, Ghosh M, et al. High Efficiency Counter Mode Security Architecture Via Prediction and Precomputation[A]. Proceedings of the 32nd International Symposium on Computer Architecture(ISCA'05)[C].Washington: IEEE Computer Society, 2005. 14-25.
  • 4Tang Shaohua. Improvement of Lamport's One-Time Password Authentication Scheme[J]. Journal of South China University of Technology, 2001, 29(8):70-72.
  • 5Cheswick W R,Bellovin S M, Rubin A D. Firewall and Internet Security [M]. Boston: Addison-Wesley Publishing. 2003.

同被引文献28

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部