期刊文献+

基于智能卡芯片指纹的身份认证方案设计

Design of User Authentication Scheme Based on Smart Card's Chip Signature
下载PDF
导出
摘要 身份认证在网络安全中有非常着重要的作用。最近,Das等人提出了一种基于智能卡和动态ID的身份认证方案。在分析其方案漏洞的基础上,引入芯片指纹和随机数,提出了一种改进方案,能有效地抵抗伪装攻击、芯片复制攻击、拒绝服务攻击、重传攻击、口令猜测攻击,在对系统安全度要求较高的环境中有着良好的应用前景。 User authentication has very important applications in network security. Recently, Das et al. proposed a user authentication scheme based on smartcard and dynamic ID. We propose an improved scheme by introducing chip signature and random numbers after analyzing the loopholes of the original scheme. Our scheme can effectively withstand masquerade attack, chip-reproducing attack, DoS attack, replay attack and guessing attack.Our scheme has a promising prospect in environment where demands high system security.
出处 《微型电脑应用》 2008年第6期20-22,1,共3页 Microcomputer Applications
基金 国家863项目(2006AA01Z446)
关键词 身份认证 智能卡 芯片指纹 随机数 User authentication Smart card Chip signature Random number
  • 相关文献

参考文献7

  • 1H Y Chien, J K Jan, YM Tseng. An Efficient and Practical to Remote Authentication: Smart Card [J ]. Computers and Security, 2002, 21 (4).
  • 2Chien L H. Security of Two Remote User Authentication Schemes Using Smart Cards [J ]. IEEE Trans. on Consumer Electronics, 2003, 49(4): 11962-1198.
  • 3Wei Chui Ku, Shuai Min Chen. Weakness and Improvement of Efficient Password Based Remote user Authentication Scheme Using Smart Card [ J ]. IEEE Trans. on Consumer Electronics, 2004, 50 (1).
  • 4Das ML, Saxena A, Gulat V P. A dynamic ID-based remote user authentication scheme [J ]. IEEE Trans Consumer Electronic, 2004, 50(2):629-631.
  • 5B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Controlled physical random functions[ A]. Proceedings of 18 th Annual Computer Security Applications Conference [C].December 2002
  • 6Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, and Srinivas Devadas. Extracting Secret Keys From Integrated Circuits[J ]. IEEE transactions on very. large scale integration (VLSI) systems, 2005,13(10).
  • 7朱浩瑾,曹珍富.基于智能卡的椭圆曲线动态身份认证体制[J].计算机工程,2006,32(2):135-136. 被引量:5

二级参考文献7

  • 1Guillou L, Ugon M, Quisquater J J. Cryptographic Authentication Protocols for Smart Cards[J]. Computer Networks, 2001, 36 (4):437-451.
  • 2Guillou L, Quisquater J J, A Practical Zero-knowledge Protocol Fitted to Security Microprocessors Minimizing both Transmission and Memory[C]. Advances in Cryptology- Proceedings of Eurocrypt '88,Lecture Notes in Computer Science, Springer, Berlin, 1989, 330: 123-128.
  • 3Guillou L, Quisquater J J. A Paradoxical Identity-based Signature Scheme Resulting from Zero-knowledge[C]. Advances in Cryptology- Proceedings of Eurocrypt '88, Lecture Notes in Computer Science, Springer, Berlin, 1990, 403:216-231.
  • 4Mohammed E, Emarah A E, EI-Shennawy K, Elliptic Curve Cryptosystems on Smart Cards[C]. Proceedings of 2001 IEEE 35^th international Carnahan Conference on Security Technology, 2001-10,16/19:213-222.
  • 5Johnson D, Menezes A. The Elliptic Curve Digital Signature Algorithm (ECDSA)[R]. Technical Report CORR 99-06, Department of Combinatorics & Optimization, University of Waterloo, 1999,http://www.cacr.math.uwaterloo.ca/.
  • 6张方国,廖平,王育民.数字电视中的一种新的身份认证方案[J].电子学报,2001,29(7):927-929. 被引量:4
  • 7王斌,李建华.基于智能卡的动态身份认证机制[J].通信学报,2003,24(8):117-121. 被引量:5

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部