期刊文献+

一种基于二次剩余的动态口令算法 被引量:5

Dynamic password scheme based on quadratic residues
下载PDF
导出
摘要 针对基于动态口令的电子商务身份认证机制存在计算和通信负担过重及不能对用户的使用次数和使用时间进行控制的问题,利用二次剩余理论中计算模平方根的复杂性提出一种基于二次剩余的动态口令算法。本算法具有失效次数和失效时间两个特性,因为不需要任何口令和验证表,可以避免重放攻击,因此具有稳定的安全性。这些特点使其适合用于电子商务,如在线游戏、付费电视等。另外本算法客户端计算量很小,可以用于手机等计算能力有限的环境。 Dynamic password based on authentication mechanism for electronic commerce which had an excessive burden of computing and communications and could not control the number and time that each user was entitled to use,the use of complexity of modular square root in quadratic residues,this paper proposed a dynamic password scheme based on quadratic residues to solve these problems.This algorithm had countable and time-bound features,did not require any password or verification table,it could avoid replay attacks and was under firm security.These features make this scheme more reliable for applications in the field of electronic commerce,such as on-line games,pay-TV,and so on.This algorithm has a lower computational overhead on client,can be used in mobile environment with limited computing capability.
作者 贾淑红
出处 《计算机应用研究》 CSCD 北大核心 2010年第4期1503-1504,1507,共3页 Application Research of Computers
基金 浙江建设职业技术学院科研基金资助项目(200909)
关键词 电子商务 身份认证 动态口令 二次剩余 electronic commerce user authentication dynamic password quadratic residues
  • 相关文献

参考文献6

  • 1UDI M.A simple scheme to make passwords based on one-way function much harder to crack[J].Computers & Security,1996,15 (2):171-176.
  • 2LENNON R E,MATYAS S M,MEYER C H.Cryptographic authentication of time-invariant quantities[J].IEEE Trans on Communications,1981,29 (6):773-777.
  • 3NEUMANN P G.Risks of passwords[J].Communications of the ACM,1994,37 (4):126.
  • 4CHANG C C,TSU S M,CHEN C Y.Remote scheme for password authentication based on theory of quadratic residues[J].Computer Communications,1995,18 (12):936-942.
  • 5HWANG M S.A remote password authentication scheme based on the digital signature method[J].International Journal of Computer Mathematics,1999,70 (4):657-666.
  • 6SCHNEIER B.Applied cryptography[M].2nd ed.[S.l.]:Wiley,1996.

同被引文献21

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部