期刊文献+

基于智能卡的扩展混沌映射异步认证密钥协商协议 被引量:5

Chaotic Mapping Asynchronous Authentication Key Agreement Scheme with Smart-cards
下载PDF
导出
摘要 身份认证是确保信息安全的重要手段,混沌映射身份认证协议因其高效性而成为近期研究的热点。2015年,Zhu提出了一个改进的混沌映射协议,声称其可以抵抗冒充攻击、字典攻击,并且提供用户匿名性;然而,Tong等指出Zhu的协议存在离线字典攻击、冒充攻击等问题且无法确保用户匿名性,并提出了一个新的改进协议(简称TC协议)。针对Zhu和TC协议方案,文中指出了其不能确保前向安全性以及容易遭受拒绝服务攻击等安全性缺陷,并提出了一个新的基于智能卡的混沌映射协议方案。安全性分析及同其他相关方案的比较结果表明了所提协议的高安全性和实用性。 Identity authentication is an important means to ensure information security.Chaos mapping indentity authentication scheme has become a hot research topic recently because of its high efficieny.In 2015,Zhu proposed an improved chaotic mapping protocol,and claimed that it can oppose impersonation attack and dictionary attack,and it also can provide user anonymity.However,Tong et al.pointed out Zhu’s protocol has the problems of offline dictionary attack,impersonation attack and can’t guarantee user’s anonymity,and proposed a new improvement protocol(short for TC scheme).Aiming at Zhu and TC protocol schemes,this paper pointed out their security defects,for example,the forward security can’t be guaranteed and they are easy suffering from denial of service attack.Meanwhile,this paper proposed a new protocol scheme using smart card.The security analysis and the comparison results with other related protocols indicate the high security and practicability of the porposed protocol.
作者 王松伟 陈建华 WANG Song-wei;CHEN Jian-hua(School of Mathematics and Statics,Wuhan University,Wuhan 430072,China)
出处 《计算机科学》 CSCD 北大核心 2019年第1期175-181,共7页 Computer Science
关键词 混沌映射 异步 动态身份 认证 密钥协商 Chaotic mapping Asynchronous Dynamic identity Authentication Key agreement
  • 相关文献

参考文献8

二级参考文献81

  • 1高岩,程胜利.构筑网络安全通道—虚拟专用网技术[J].交通与计算机,2001,19(z1):30-32. 被引量:2
  • 2李国民.Yahalom协议的安全性分析及其改进方法[J].微机发展,2005,15(4):96-97. 被引量:4
  • 3卓继亮,李先贤,李建欣,怀进鹏.安全协议的攻击分类及其安全性评估[J].计算机研究与发展,2005,42(7):1100-1107. 被引量:16
  • 4陆丽娜等译.分布式操作系统[M].北京:电子工业出版社,1999-12..
  • 5Chien H Y,Jan J Y,Tseng Y M. An Efficient and Practical Solution to Remote Authentication: Smart Card[J]. Comput ers & Security,2002,21(4):372-375.
  • 6Lee S,Kim H, Yoo K. Improved Efficienl Remote User Au- thentication Scheme Using Smart Cards[J]. IEEE Trans on Consumer Electronics,2004,50(2) :565-567.
  • 7Lee S,Kim H,Yoo K. Improvement of Chien et al's Remote User Authentication Scheme Using Smart Cards[J]. Comput- er Standards &, Interfaces,200,5,27(2) : 181-183.
  • 8Yoon E,Yoo K. More Efficient and Secure Remote User Au- thentication Scheme Using Smart Cards[C]//Proc of the 1th Int'l Conf on Parallel and Distributed System,2005:73-77.
  • 9Xu Jing,Zhu Wen-Tao, Feng Deng-Guo. An Improved Smart Card Based Password Authentication Scheme with Provable Security[J]. Computer Standards & Interfaces, 2009,31 (4) : 723-728.
  • 10Mills D L.NTP Architecture,Protocol And Algorithms University of Delaware[EB/OL].http ://www.eecis.udel.edu/-mills/database/brief/arch/ arch.htm, 2001-05-25.

共引文献95

同被引文献31

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部