期刊文献+

基于服务器私人密钥轻量级的身份验证协议 被引量:1

Lightweight authentication protocol based on server private key
下载PDF
导出
摘要 通过对已有智能卡远程用户认证协议进行分析,指出该身份验证协议无法抵御离线密码猜测攻击,且不能提供用户匿名性,并提出一种轻量级的身份验证协议。所有发送的信息均不包含密码信息,通过设置服务器私人密钥的方式抵御离线密码猜测攻击。为实现用户匿名性,使攻击者无法对用户的行为进行跟踪,在每个会话中采用掩码用户身份标识。BAN逻辑证明了所提协议的正确性。与其它协议相比,所提协议在身份验证安全性方面更优,执行时间适中,适用于真实环境。 After analyzing the remote user authentication protocol based on smart card,it was pointed out that the authentication protocol can not resist off-line password guessing attack,and that it also can not provide user anonymity.Meanwhile,a lightweight authentication protocol was proposed.All the sending messages did not contain password information,and by setting up the server private key,the protocol protected against offline password guessing attacks.To realize user anonymity and to make the attacker unable to track the user’s behavior,masked user identity was used in each session.The BAN logic proves the correctness of the proposed protocol.Compared with other protocols,the proposed protocol is better in authentication and security.And the execution time is moderate,which is more suitable for real applications.
作者 李祉岐 孙磊 闻凯 LI Zhi-qi;SUN Lei;WEN Kai(Beijing Telecom Network Technology Limited Company,Beijing 100070,China;College of Automation,Nanjing University of Aeronautics and Astronautics,Nanjing 210016,China)
出处 《计算机工程与设计》 北大核心 2018年第11期3374-3379,共6页 Computer Engineering and Design
关键词 远程用户认证 匿名性 私人密钥 密码猜测攻击 BAN逻辑 remote user authentication anonymity private key password guessing attack BAN logic
  • 相关文献

参考文献8

二级参考文献103

  • 1孙玉砚,刘卓华,李强,孙利民.一种面向3G接入的物联网安全架构[J].计算机研究与发展,2010,47(S2):327-332. 被引量:18
  • 2曾丽华,熊璋,张挺.Key值更新随机Hash锁对RFID安全隐私的加强[J].计算机工程,2007,33(3):151-153. 被引量:34
  • 3Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. New York, USA: CRC Press, 1996.
  • 4Nessett D M. Factors Affecting Distributed System Security[J]. IEEE Transactions on Sol, ware Engineering, 1987, SE-13(2): 233-248.
  • 5Schneier B. Why Cryptography Is Harder than It Looks[J]. Information Security Bulletin, 1997, 2(2): 31-36.
  • 6Dolev D, Yao Chi-Chih. On the Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.
  • 7Nessett D. A Critique of the Burrows, Abbadi and Needham Logic[J]. Operating Systems Review, 1990, 24(2): 35-38.
  • 8Burrows M, Abadi M, Needham R. A Logic of Authentication[J]. ACM Transactions on Computer Systems, 1990, 8(I): 18-36.
  • 9Gong Li, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]//Proceedings of IEEE Symposium on Research in Security and Privacy. [S. 1.]: IEEE Press, 1990: 234-248.
  • 10Cohen M, Dam M. A Completeness Result for BAN Logic[EB/OL]. [2011-06-22]. http://www.access.ee.kth.se/reports/2007/13.pdf.

共引文献52

同被引文献9

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部