期刊文献+

一种基于移动终端的双因子身份认证系统 被引量:2

A Double Factor Authentication System Based on Mobile Terminal
下载PDF
导出
摘要 身份认证作为安全应用系统的第一道防线,是最重要的安全服务.通过分析基于用户名/密码的静态身份认证方案和一次性口令OTP各自的缺点以及恶意程序对二者安全的影响,提出了一种基于移动终端的双因子身份认证系统.分析测试表明,系统解决了口令猜测、小数攻击以及恶意程序带来的口令泄露等诸多安全问题,同时具备较好的运行效率. As the first defense line of secure application system, the identity authentication is the most important secure service. By analyzing disadvantages of username/password and one-time password, and the threat of malware, we proposed a double factor authentication system based on mobile terminal. Analyzing and testing of the prototype system indicated that the system can resolve problems such as password guess, small integer attack, password leak brought by malware, etc, and have well running efficiency.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第12期156-159,共4页 Microelectronics & Computer
基金 甘肃省科技攻关计划项目(2GS064-A52-035-09)
关键词 一次性口令 报文验证码 移动终端 蓝牙 one-time password MAC mobile terminal blue tooth
  • 相关文献

参考文献6

  • 1HaUer N. A one- time password system[S]. Internet Engineerning Task Force, RFC 2289,1998.
  • 2李世平,李凤霞,战守义.S/key认证系统的安全缺陷及改进[J].计算机工程,2003,29(20):18-19. 被引量:10
  • 3唐文武,方勇,潘春兰.基于Diffie-Hellman的一次性口令认证方案[J].微电子学与计算机,2008,25(10):182-184. 被引量:1
  • 4Wu M, Garfinkel S, Miller R. Secure web authentication with mobile phones[ C]//DIMACS Workshop on Usable Privacy and Security Systems. Piscataway, 2004.
  • 5NIST. The keyed- hash message authentication code (HMAC)[S]. FIPS PUB 198, 2002.
  • 6Mobile Antivirus Researchers Association. Analyzing the crossover virus: the first PC to windows handheld crossinfector[ EB/OL]. (2006- 10- 11)[2009- 03- 10]. http://www. informit.com.

二级参考文献14

  • 1高雪,张焕国,孙晓梅.一种改进的一次性口令认证方案[J].计算机应用研究,2006,23(6):127-128. 被引量:18
  • 2I Lamport L.Password Authentication with Insecure Communication. Communications of the ACM,1981,24( 11 ):770-772.
  • 3Hailer N.RFC 1760:The S/Key One-time Password System. 1995-02.
  • 4Hailer N M.The S/Key One-time Password Svstem.ISOC.1994.
  • 5Sandiringama M,Shimizu A,Noda M T.Simple and Secure Password Authentication Protocol.lEICE Trans. Comm.,2000,E83-B(6):1363.
  • 6Feng Dengguo.Analytics of Cryptograph.Beijing:Tsinghua University Press,2000.
  • 7Schncier B.Applied Cryptography:Protocols,Algorithms,and Source Code in C(Second Edition).Beijing: China Machine Press,2000.
  • 8Hung-Yu Chien,Yi-hwa Chen,Jinn-ke Jan,et al.Cryptanalysis on Dynamic Authentication Protocol for Personal Communication System. Electronics Letters,2001,37( 14):895-896.
  • 9Lamport L. Password authentication with insecure communication[J]. Communication of the ACM, 1981(24) : 770 - 772.
  • 10Lee L, Li H, Hwang M S. A remote user authentication scheme using hash functions[J]. ACM Operating Systems Review, 2002,36(4): 23-29.

共引文献9

同被引文献11

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部