期刊文献+

哈希算法在口令访问控制模块中的应用研究 被引量:2

Application of Hash algorithm in password access control module
下载PDF
导出
摘要 为了加强应用系统用户口令的安全性,本文在口令访问控制模块中引入了单向哈希算法,提出一个安全用户认证模型,采取有效的数据加密技术来控制存取数据访问。通过哈希算法把用户身份认证信息加密后以密文的形式存放在数据库中,进一步提高了系统的安全性。对于身份认证,相对于明文的验证方式,哈希认证的单项散列特性使它更加具有安全性,对穷举攻击更具有抵抗性。 In order to enhance the security of the user password of the application system,this paper introduces one-way Hash Algorithm to the password access control module,proposes a secure user authentication model and takes effective data encryption to control data access.The Hash algorithm is used to encrypt the user identity authentication information and the encrypted information is store as ciphertext in the database so as to further improve the security of the system.Compared with the verifying method of the plaintext,one-way hash characteristic of the Hash authentication makes it more secure and resistant to the exhaustive attack.
作者 蒋志强 Jiang Zhiqiang(Zhixing College Of Northwest Normal University,Lanzhou,Gansu 730070,China)
出处 《计算机时代》 2018年第8期54-56,共3页 Computer Era
关键词 访问控制 身份认证 哈希算法 口令 数据加密 access control identity authentication Hash algorithm password data encryption
  • 相关文献

参考文献4

二级参考文献19

  • 1李玉海,桂学勤.电子商务安全问题及其解决方案[J].电子商务,2006,7(12):51-55. 被引量:18
  • 2Lamport L. Password Authentication with Insecure Communication[J]. Communications of the ACM, 1981, 24(11): 770 - 772.
  • 3Haller N. The S/KEY One - Time Password System. RFC1760. 1995.
  • 4Gabber E,Gibbons P B, Matias Y, Mayer A. How to Make Personalized Web Browsing Simple, Secure and Anonymous [J]. Proceedings of Financial Cryptography' 97, Anguilla: Springer - Verlag, 1997 : 17 - 31.
  • 5Ross B,Jackson C, Miyake N,et al. Stronger Password Authentication Using Browser Extensions [A]. Proceedings of the 14th USENIX Security Symposium[C]. 2005 : 17 - 32.
  • 6Halderman J A, Waters B, Fehen E W. A Convenient Method for Securely Managing Passwords[A]. Proceedings of the 14th International Conference on World Wide Web [C]. Chiba: ACM Press, 2005 : 471 - 479.
  • 7Yee K P,Sitaker K. Passpet:Convenient Password Management and Phishing Proteetion[A]. Proceedings of the Second Symposium on Usable Privacy and Security[C]. New York: ACM ,2006:32 - 43.
  • 8Gajek S,Sadeghi A R,Stuble C,et al. Compartmented Security for Browsers - or How to thwat a phisher with trusted computing[A]. Proceedings of the 2nd International Conference on Availability,Reliability and Security[C]. Washington DC : IEEE Computer Society, 2007 .. 120 - 127.
  • 9Schneier B. Password SafeE [EB/OL]. http://www, schneier. com/passsafe, html.
  • 10Mark Stamp. Information Security: Principles and Practice [M]. Wiley, 2006.

共引文献6

同被引文献28

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部