期刊文献+

一种基于软令牌的企业即时通信双向认证方案

A EIM mutual Authentication Scheme Based on Soft Token
下载PDF
导出
摘要 为了提高EIM(Enterprise Instant Messenger)的安全性,在对比当前常用认证技术的基础上,提出了一种结合HASH函数、对称密码机制以及挑战/应答机制的基于软令牌的双向认证方案。最后对该方案进行了性能分析。结果表明:该方案具有保护用户身份信息,防止诸如重放、假冒和穷举等常见身份认证攻击,实现双向认证的优点。 In order to improve the security of EIM, based on the comparison of the present-use authentication technologies, and this paper proposes a mutual authentication scheme based on soft token in combination of HASH function, symmetric encryption, and challenge/response mechanism. Finally, analysis on the scheme indicates that this scheme is of such capabilities as protection of user identity information, prevention of ID authentication attack, including playback attack, impersonation attack and exhaustive attack, etc. ) , and could achieve mutual authentication.
出处 《贵州大学学报(自然科学版)》 2011年第5期108-111,共4页 Journal of Guizhou University:Natural Sciences
关键词 EIM 双向认证 软令牌 重放攻击 穷举攻击 EIM mutual authentication soft token playback attack exhaustive attack
  • 相关文献

参考文献7

二级参考文献46

  • 1朱浩瑾,曹珍富.基于智能卡的椭圆曲线动态身份认证体制[J].计算机工程,2006,32(2):135-136. 被引量:5
  • 2Lamport L. Password authentication with insecure communication. Communications of the ACM,1981,24(11): 770~772.
  • 3Hailer N M. The S/Key one-time password system. In:Proc. of the Internet Society Symposium on Network and Distributed System Security, San Diego, CA,Feb. 1994.
  • 4Rigney C, Rubens A, Simpson W, Willens S. Remote Authentication Dial In User Service(RADIUS). RFC 2138, April 1997.
  • 5Rigney C. RADIUS Accounting. RFC 2139, April 1997.
  • 6Steiner J, Neuman B C, Schiller J I. Kerberos : An authentication service for open network systems. In: Proc. Winter USENIX Conference,Dallas, TX, 1988. 191~202.
  • 7Kohl J, Neuman C. The Kerberos Network Authentication Service(V5). RFG 1510,Sep. 1993.
  • 8Tsudik G. Message authentication with one-way hash functions.In :Proc. of IEEE Infocom' 92, Florence ,Italy, May 1992.
  • 9Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York, 1994.
  • 10Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21(12) :993~999.

共引文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部