期刊文献+

一种改进的智能卡认证方法的实现 被引量:5

Implementation of an improved authentication method on IC card
下载PDF
导出
摘要 分析了传统智能卡认证方法的缺点,提出了一种改进的基于用户自定义算法环境的防攻击智能卡认证方法。智能卡可以根据用户自定义的算法环境,按照不同的算法进行认证。本文支持的算法可以分为DES算法和16字节分组长度算法,用户可以通过命令指定算法类型来完成智能卡的认证,从而达到一定的使用权限,完成需要操作的权限认证。同时,还提出一种防攻击的方法通过限制外部认证密钥可尝试的次数,保证智能卡系统在被外界恶意攻击的情况下的数据传输的安全性。 Analyzes disadvantages of traditional authentication on IC card, and proposes an improved IC card authentication method based on user-defined algorithm environment so as to avoid attacks. Cards can be authenticated by various algorithms according to user-defined algorithm environment. The sup- ported algorithms can be categorized into DES algorithms and 16 byte packet length algorithms. Users can use the algorithm specified by command to complete the smart card authentication, thus achieving certain permissions and completing the certification authority of the required operation. Meanwhile, the paper proposes another method to avoid attacks, which can guarantee the safety of data transport by lim- iting the use times of external authentication key even if the system is under attack.
出处 《计算机工程与科学》 CSCD 北大核心 2014年第1期94-98,共5页 Computer Engineering & Science
基金 北京市科委项目资助(TF71-11-001)
关键词 智能卡 算法环境 认证方法 防攻击 IC card augorithms environment authentication method avoid attacking
  • 相关文献

参考文献8

二级参考文献58

  • 1王猛,卢建朱,李晓峰.基于智能卡的远程口令认证方案[J].计算机应用,2005,25(10):2289-2290. 被引量:6
  • 2孟键,马传贵.基于群签名的公平电子拍卖方案[J].微计算机信息,2006,22(02X):129-130. 被引量:6
  • 3张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 4冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 5SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:39
  • 6SUN H M.An Efficient Remote User Authentication Scheme Using Smart Cards[J].IEEE Trans on Consumer Election,2000.46(4):958-961.
  • 7CHIEN L H.Security of Two Remote User Authentication Scheme Using Smart Cards[J].IEEE Trans on Consumer Election,2003,49(04):1196-1198.
  • 8Lamport L. Password authentication with insecure communication [ J ]. Communications of the ACM, 1981,24( 11 ) :770-772.
  • 9Xu J, Zhu W T, Feng D G. An improved smart card based password au- thentication scheme with provable security [ J ]. Computer Standards and Interfaces,2009,31 (4) : 723 - 728.
  • 10Song R. Advanced smart card based password authentication protocol [ J]. Computer Standards and Interfaces,2010,32:321 - 325.

共引文献41

同被引文献45

  • 1王昆,沙瀛,谭建龙.基于Cookie劫持的Deep-Web用户数据安全性分析[J].计算机研究与发展,2012,49(S2):17-22. 被引量:3
  • 2斯里达尔.艾杨格.可信平台的新范式.中国计算机学会通讯,2014,(12):61-63.
  • 3PIPPAL R S,JAIDHAR C D,TAPASWI S.Comments on symmetric key encryption based smart card authentication scheme[C]//Proceedings of the 2nd International Conference on Computer Technology and Development.Cario:IEEE,2010:482-484.
  • 4SORAM R,CHATTERJEE R,ROY D P,et al.A remote smart card authentication protocol using elliptic curves[J].International journal of computer science&information technologies,2012,29(3):3856-3866.
  • 5PIPPAL R S,GUPTA P,SINGH R.A novel smart card authentication scheme using image encryption[J].International journal of computer applications,2013,72(9):8-14.
  • 6MUNIYANDI A P,RAMASAMY R.Password based remote au-thentication scheme using ECC for smart card[C]//Proceedingsof the 2011 International Conference on Communication,Com-puting&Security.Odisha,India:International Conference onCommunication,2011:1-8.
  • 7WEI J H,LIU W F,HU X X.Cryptanalysis and improvement of a robust smart card authentication scheme for multiserver architecture[J].Wireless personal communications,2014,77(3):2255-2269.
  • 8PIPPAL R S,GUPTA P,SINGH R.Dynamic encryption key based smart card authentication scheme[J].International journal of computer applications,2013,72(9):15-18.
  • 9LI X,NIU J W,KUMARI S,et al.An enhancement of a smart card authentication scheme for multi-server architecture[J].Wireless personal communications,2015,80(1):175-192.
  • 10LI X,NIU J,KHAN M K,et al.An enhanced smart card based remote user password authentication scheme[J].Journal of network&computer applications,2013,36(5):1365-1371.

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部