期刊文献+

基于混沌的远程安全访问一次性口令认证模型 被引量:1

Remote Secure Access of One-time Password Authentication Based on Chaotic System
下载PDF
导出
摘要 一次性口令认证(OTP)是为防止黑客通过一次成功的口令窃取而永久地获得系统访问权,而设计的一种认证技术.它规定用户每次登录时使用不同的口令,限制了同一口令的生存周期.本文在论述基于混沌的一次性口令认证的基本原理基础上,提出了一种基于混沌的远程安全访问一次性口令认证模型,并给出了模型的算法实现,解决了对远程安全访问中的用户鉴别问题.性能分析结果表明,本算法在混沌映射的基础上产生摘要信息,在较小代价上实现了系统安全强度的较大提升,较好地实现了安全性与易用性的平衡. One-Time Password (OTP) system is designed to avoid perpetual invasions via a casual successful password stolen by some hackers. It requires a new password once the user logs in the system, which confines the period of the same password. This paper testifies the principle of OTP and presents the authentication model based on the chaotic system, realizing authentication on remote secure access.
作者 朱小菲
出处 《哈尔滨理工大学学报》 CAS 2008年第3期54-56,共3页 Journal of Harbin University of Science and Technology
关键词 混沌 一次性口令机制(OTP) 身份鉴别 chaos one-time password (OTP) user authentication
  • 相关文献

参考文献5

  • 1MATTHEWS R. On the Derivation of a Chaotic Encryption Algorithm [J]. Cryptologia, 1989(4) : 29 -42.
  • 2SHANNON C E. Communication Theory of Secrecy Systems [ J ]. Bell System Technical Journal, 1949,28 (4) :656 -715.
  • 3NEIL M H. The S/KEY One-time Password System[ R]. The Internet Engineering Task Force, RFC2289,1998.
  • 4NEIL M H. A One-time Password System[ S]. RFC2289,1998.
  • 5蒋本铁,刘嘉辉,徐彬.一种基于混沌和Fibonacci伪随机数列的加密方法[J].东北大学学报(自然科学版),2005,26(9):864-866. 被引量:10

二级参考文献9

  • 1Andrze J K, Masanori O, Yoshio T. How can we observe and describe chaos [ J ]. Open Systems and Information Dynamics, 2003, 10(3) :221 -233.
  • 2Tong H. Nonlinear time series analysis since 1990: some permnal reflections [ J ]. Acta Mathematicae Applicatae Sinica (Englistz Series), 2002,18(2) : 177 - 184.
  • 3Kocarev L, Jakimoski G. Logistic map as a block encryption algorithm[J ]. Physics Letters A, 2001,289 (4 - 5 ) : 199 -206.
  • 4Pareek N K, Patidar V, Sud K K. Discrete chaotic cryptography using external key [ J ]. Physics Letters A,2003,309( 1 - 2) : 75 - 82.
  • 5Li S J, Mou X Q, Cai Y L, et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision[J]. Computer Physics Communications,2003,153( 1 ) : 52 - 58.
  • 6Xu H B, Wang G R, chen S G.Controlling chaos by a modified straight-line stabilization method[J ]. The European Physical Journal B, 2001,22( 1 ) :65 - 69.
  • 7Oliveira J B, de Figueiredo L H. Interval computation of viswanath's constant[J ]. Reliable Computing, 2002,8 ( 2 ) :131 - 138.
  • 8朱伟勇,焉德军.Anosov 映射的 Markov 分解中拟 Fibonacci 序── 一通向混沌的新途径[J].东北大学学报(自然科学版),1998,19(2):171-173. 被引量:2
  • 9杨自强,魏公毅.综述:产生伪随机数的若干新方法[J].数值计算与计算机应用,2001,22(3):201-216. 被引量:63

共引文献9

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部