期刊文献+

新型S/KEY认证方案的分析与设计 被引量:6

Analysis and Design of New S/KEY Authorization Solution
下载PDF
导出
摘要 分析传统S/KEY型一次性口令认证系统的缺陷,提出一种新型的S/KEY认证方案,实现客户端与服务器的双向认证,可进行会话密钥协商,且每次认证产生不同的会话密钥。该方案可有效抵御重放攻击、小数攻击、破坏协议攻击和冒充攻击,对中间人攻击也有较强的防御作用。 This paper analyzes some defects of the traditional S/KEY One-Time Password(OTP) authorization system, and proposes a new S/KEY authorization solution. Mutual authorization between clients and the server and session key agreement is carried out, and new session key is produced in each authorization. The new S/KEY solution can effectively resist replay attacks, small integer attacks, protocol-broken attacks and personate attacks, and especially has some effects against the man-in-the-middle attacks.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第5期175-176,193,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60673131) 黑龙江省自然科学基金资助项目(F200608) 黑龙江省教育厅海外学人重点科研基金资助项目(1152hq08)
关键词 一次性口令 身份认证 S/KEY认证 One-Time Password(OTP) identity authorization S/KEY authorization
  • 相关文献

参考文献5

  • 1Lamport L. Password Authentication with Insecure Communication[J]. Communications of the ACM, 1981, 24(11 ): 770-772.
  • 2Hailer N M. The S/Key One-time Password System[C]//Proceedings of the Internet Society Symposium on Network and Distributed System Security. San Diego, CA, USA: [s. n.], 1994.
  • 3高雪,张焕国,孙晓梅.一种改进的一次性口令认证方案[J].计算机应用研究,2006,23(6):127-128. 被引量:18
  • 4梁喆,方勇.融入混沌理论的一种OTP方案研究[J].计算机工程,2007,33(7):160-162. 被引量:6
  • 5Schneier B. Applied Cryptography-protocols Algorithms and Source Code in C[M]. New York, USA: John Wiley and Sons Inc., 1996.

二级参考文献13

  • 1孟艳,毛泾波.基于混沌的密码学研究[J].计算机安全,2004(12):11-12. 被引量:5
  • 2H Y Chien,J K Jan,Y M Tseng.An Efficient and Practical Solution to Remote Authentication:SmartCard[J].Computers & Security,2002,21(4):372-375.
  • 3Wei-Chi Ku,Shuai-Min Chen.Weakness and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards[J].IEEE Transactions on Consumer Electronics,2004,50(1):204-207.
  • 4NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Ha-shing Functions and the Continued Security Provided by SHA-1[EB/OL].http://csrc.nist.gov/hash_standards_comments.pdf,2004.
  • 5Haller N,R Atkinson.On Internet Authentication[S].RFC 1704,1994.
  • 6L Lamport.Password Authentication with Insecure Communication[J].Communication of ACM,1981,24:770-772.
  • 7C J Mitchell,L Chen.Comments on the S/KEY User Authentication Scheme[J].ACM Operating System Review,1996,30(4):12-16.
  • 8Rigney C,Rubens A,Simpson W.Remote Authentication Dial in User Service (RADIUS)[S].RFC 2138,1997.
  • 9Lamport L.Password Authentication with Insecure Communication[J].Communications of the ACM,1981,24(11):770-772.
  • 10Haller N M.The S/Key One-time Password System[C]//Proceedings of the Internet SoCiety Symposium on Network and Distributed System Security,Sam Diego,CA.1994.

共引文献21

同被引文献45

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部