期刊文献+

基于智能卡的轻量级非平衡型口令认证方案

A Balanced Password Authentication Schemes based on Smart Card
原文传递
导出
摘要 智能卡与口令相结合的身份认证方式既可保留使用强密钥优势,又具有使用方便的特点,是一种理想的安全双因子认证方式。当前许多公开的口令认证方案,要么需要较强的计算环境而难于采用智能卡快速实现,要么不能抵抗离线口令猜测攻击或服务端内部攻击而存在安全缺陷。提出一种非平衡型口令认证方案,基于智能卡和用户口令双因子设计,具有简便高效、口令安全、双向认证特点,能够抵御离线口令猜测攻击和服务端内部攻击,可用于满足设备开机时的安全认证需求。 Remote user authentication protocol using smart cards togeth -factor scheme, which has the advantage of secure and convenience er with password is an efficient double At present, among the password authentication schemes, many of them can' t use smart card, because password authentication method needs complex computer operations. However, some password authentication method based on smart card can' t be against to guessing attack. To remedy these flaws, this paper proposes an efficient improvement over Xiao- Min Wang' s with more security, which can be against guessing attack and Server internal attack.
出处 《通信技术》 2014年第8期930-934,共5页 Communications Technology
基金 青年科学基金项目(No.61309034)~~
关键词 智能卡 口令 认证 smart card password authentication
  • 相关文献

参考文献9

  • 1李波,杨茂云,何大可.一种智能卡口令认证方案的分析与改进[J].通信技术,2003,36(8):104-105. 被引量:3
  • 2王海龙,戴英侠.远程接入短信动态口令系统的阻塞攻击分析及其对策[J].信息安全与通信保密,2008,30(12):103-106. 被引量:1
  • 3ISO/IEC 11770 -4 -2006, Information Technology-Securi- ty Techniques - Key Management - Part4: Mechanisms based on Weak Secrets [ S ]. [ s. 1. ]: Joint Technical Committee ISO/IEC JTC 1,2006.
  • 4Hwang M S, Li L H. A New Remote User Authentication Scheme Using Smart Cards [ J ]. IEEE Transactions on Consumer Electronics, 2000, 46 (01) : 28-30.
  • 5SUN H M. An Efficient Remote User Authentication Scheme Using Amart Cards [ J ]. IEEE Transactions on Consumer Electronics, 2000, 46 (04) : 958-961.
  • 6KU W C , CHEN S M. Weaknesses and Improvement of an Efficient Password based Remote User Authentication Scheme Using Smart Cards [ J ], IEEE Transactions on Consumer Electronics, 2004, 50(01 ) :204-207.
  • 7WANG Xiao-min, ZHANG Wen-fang. Cryptanalysis and Improvement on two Efficient Remote User Authentication Scheme Using Smart Cards[ J ]. Computer Standards & in- terfaces, 2007 ( 29 ) : 507-512.
  • 8Ratha N, Connell J, Bolle R., Enhancing Security and Privacy in Biometries-based Authentication Systems[ J]. IBM Systems Journal, 2010(40) : 614-634.
  • 9Simoens K, Bringer J, Chabanne H, Seys S. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems[J]. IEEE Transactions on Informa- tion Forensics and Security,2012,7(02) :833-841.

二级参考文献15

  • 1谢亮,汪海航,谭成翔.安全短消息应用系统方案研究[J].计算机安全,2007(8):30-32. 被引量:5
  • 2[1]Robert Morris,Ken Thompson.Password security.A case history[J].CACAM,22(11):594-597,November 1979.
  • 3[2]L Lamport.Password authentication with insecure communication[J].Communications of the ACM,vol.24,770-772,November 1981.
  • 4[4]William Enck,Patrick Traynor,Patrick McDaniel,et al.Exploiting Open Functionality in SMSCapable Cellular Networks[].C CS'05,November 7-11,2005,Alexandria,Virginia,USA.
  • 5[8]Neil Haller.The S/KEY One-Time Password System[C].Proceedings of the ISOC Symposium on Network and Distributed System Security,February 1994,San Diego,CA.
  • 6[9]Haller N.The S/KEY One-Time Password System[R].RFC 1760,Bellcore,February 1995.
  • 7[4]Evans A, Kantrowitz W, Weiss E. A User Authentication Scheme not Requiring Security in the Computer. Communication of the ACM,1974; 17 (8): 437 ~442
  • 8[5]Chang C C, Wu T C. Remote Password Authentication with Smart. IEE Proceeding- E, 1998; 138(3): 165 ~ 168
  • 9[6]Wang S J, Chang J F. Smart Card Based Secure Password Authentication Scheme. Computers and Security, 1999; 15 (3) :231 ~ 237
  • 10[7]Shamir A. Identity - Based Cryptosystems and Signature Schemes. Proc CRYPTO' 84, 1984:47 ~ 53

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部