期刊文献+

一种基于动态口令的异构机制身份认证方案 被引量:2

A Kind of Heterogeneous Mechanism Identity Authentication Scheme Based on Dynamic Password
下载PDF
导出
摘要 鉴于双因素认证需依赖智能卡和时钟同步问题突出,并且随机数开销大的弊端,提出了一种基于挑战应/答机制的动态口令异构机制认证方案,该方案不涉及第三方设备,通过SHA-256计算、"与"计算减轻了运算过程的开销,缩短了运算时间。同时服务器端与用户端的双向身份认证中采取随机数与Rabin加密机制加强安全性,能够有效地抵御重放攻击等各类攻击,可用于对安全性有一定要求的应用与环境。在同各类方案进行对比体现该方案优势的同时,也通过SVO逻辑方法对该方案的认证过程做了形式化的分析及论证。 Taking into account these phenomena that Two-factor authentication depends on the smart card,there is a serious clock synchronization problem,and the random number is consumed very much,a dynamic password heterogeneous mechanism authentication scheme based on challenge response mechanism is proposed.The program does not involve third-party equipment,with SHA-256 and the AND calculation reduces the overhead of the operation,shorten the operation time.At the same time,in the server and the client side of the two-way authentication to take random number and Rabin encryption mechanism to enhance security,and can effectively resist replay attacks and other types of attacks,this program can be used for applications and environments where security is required.In comparison with the various types of programs can reflect the advantages of the program,and through the SVO logic method of the program certification process to do a formal analysis and demonstration.
作者 陈如 傅明 CHEN Ru;FU Ming;(School of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha, Hunan 410114, China)
出处 《计算技术与自动化》 2018年第2期83-88,共6页 Computing Technology and Automation
关键词 软件即服务(SaaS) 动态口令 双向身份认证 SVO software-as-a-service ( SaaS ) dynamic password two-way authentication SVO
  • 相关文献

参考文献9

二级参考文献54

  • 1王宁,邱绪东,罗嫔.基于hash函数和公钥算法的一次性口令方案[J].计算机应用研究,2009,26(2):716-718. 被引量:11
  • 2王红霞,陆塞群.基于HMAC-SHA1算法的消息认证机制[J].山西师范大学学报(自然科学版),2005,19(1):30-33. 被引量:9
  • 3高雪,张焕国,孙晓梅.一种改进的一次性口令认证方案[J].计算机应用研究,2006,23(6):127-128. 被引量:18
  • 4王滨,刘刚.动态口令认证方案的研究与改进[J].计算机工程与设计,2007,28(12):2806-2808. 被引量:8
  • 5Ian Foster,Yong Zhao.Cloud computing and grid computing 360-degree compared[C].2008 Grid Computing Environments Workshop,IEEE,Austin,Texas,12-16,2008,1-10.
  • 6Rajkumar Buyya,Chee Shin Yeo,Srikumar Venugopal.Market-oriented cloud computing:vision,hype,and reality for delivering IT services as computing utilities[C].Proc.of 10th IEEE Conference on HPCC'08,IEEE,Dalian,China,25-27 Sept.2008,5-13.
  • 7OASIS Standard.Web services security:SOAP message security1.1(WS-Security 2004)[EB/OL].http://does.oasis-open.org/wss/v1.1/.1 February 2006.
  • 8Wang Lv.Security model and specifications for web services[C].China Education INFO,2004,10,24-26.
  • 9OASIS Standard.Assertions and protocols for the OASIS security assertion markup language(SAML)V2.0[EB/OL].http://docs.oasis-open.org/security/saml/v2.0/,2005-03.
  • 10W3C Recommendation.XML key management specification(XKMS2.0)[EB/OL].http://www.w3.org/TR/2002/RECxmlenc-core-20021210/,2002-12-10.

共引文献25

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部