期刊文献+

基于D-H密钥交换协议的用户认证方案

User Authentication Scheme Based on D-H Key Exchange Protocol
下载PDF
导出
摘要 分析指出Liaw等人的远程用户认证方案(Mathematical and Computer Modelling,2006,No.1/2)容易受到重放攻击和中间人攻击,并且密码修改阶段和注册阶段存在安全漏洞,在此基础上提出一个基于D-H密钥交换协议的远程用户认证方案。理论分析结果表明,该方案可以抵抗假冒攻击、重放攻击、中间人攻击,安全地实现相互认证及会话密钥生成。 Analysis indicates that Liaw et al's remote user authentication scheme is vulnerable to replay attack,man-in-the-middle attack,and there are obvious security vulnerabilities in the password changing phase and registration phase.A remote user authentication scheme based on Diffie-Hellman(D-H) key exchange protocol is proposed.Theoretical analysis shows that the scheme can resist impersonation attack,replay attack,man-in-the-middle attack,and it can implement mutual authentication and session key generation securely.
出处 《计算机工程》 CAS CSCD 2012年第20期81-84,共4页 Computer Engineering
基金 国家自然科学基金资助项目(61170233) 安徽省自然科学基金资助项目(11040606M150) 安徽省高等学校省级自然科学研究基金资助项目(KJ2011B204)
关键词 用户认证 D-H密钥交换协议 智能卡 会话密钥 哈希函数 中间人攻击 user authentication Diffie-Hellman(D-H) key exchange protocol smart card session key hash function man-in-the-middle attack
  • 相关文献

参考文献10

  • 1Lamport L. Password Authentication with Insecure Communica- tion[J] . Comm. of the ACM, 1981, 24(11) : 770-772.
  • 2Hwang M S, Li L H. A New Remote User Authentication with Smart Card[J]. IEEE Trans. on Consumer Electronics, 2000, 46(1): 28-30.
  • 3Chan C K, Cheng L M. Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards[J]. IEEE Trans. on Consumer Electronics, 2003, 49(4): 1243-1245.
  • 4Sun Hung-Min. An Efficient Remote User Authentication Scheme Using Smart Cards[J]. IEEE Trans. on Consumer Electronics, 2000, 46(4): 958-961.
  • 5Chien L H. Security of Two Remote User Authentication Schemes Using Smart Cards[J]. IEEE Trans. on Consumer Electronics, 2003, 49(4): 1196-1198.
  • 6Wu S T, Chieu B C. A User Friendly Remote Authentication Scheme with Smart Cards[J]. Computers & Security, 2003, 22(6): 547-550.
  • 7Wu S T, Chieu B C. A Note on a User Friendly Remote Authentication Scheme with Smart Cards[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E87-A(8): 2180-2181.
  • 8Lee C C, Lin C H, Chang C C. An Improved Low Computation Cost User Authentication Scheme for Mobile Communication[C]// Proc. of the 19th Advanced Information Networking and Applications. New York, USA: IEEE Press, 2005: 249-252.
  • 9Yoon E J, Yoon K Y. New Authentication Scheme Based on a One-way Hash Function and Diffie-Hellman Key Exchange[C]// Proc. of CANS’05. [S. l.]: Springer-Verlag, 2005.
  • 10Liaw H T, Lin J F, Wu W C. An Efficient and Complete Remote User Authentication Scheme Using Smart Cards[J]. Mathematical and Computer Modelling, 2006, 44(1-2): 223-228.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部