期刊文献+

远程登录几何认证方案的安全漏洞分析和解决办法 被引量:3

Cryptanalysis of a Remote Login Authentication Scheme Based on Geometric and Improvement Approach
下载PDF
导出
摘要 1995年,Tzong-ChenWu提出了一种基于欧几里德二维平面空间几何特性的远程登录身份认证方案。因为这种方案的计算复杂度很低,所以极其适合基于智能卡的安全应用。Hwang在1999年首次指出了这种认证方案存在的一个安全漏洞。最近,Huang-YuChien等人再次分析了这个方案,针对Hwang发现的安全漏洞,提出了一种新的攻击方法。不仅如此,Huang-YuChien等人还针对上述安全漏洞,给出了行之有效的解决方案。文章对这种远程登录几何认证方案做了进一步的安全性分析,指出了一些尚未被Hwang和Chien等人发现的安全隐患,并给出了相应的解决方法。 In1995,Wu proposed a smart card-oriented remote login authentication scheme based on a geometric approach.The scheme has a very low computational complexity,so it is very suitable for security application based on smart card.Hwang pointed out insecurity involved in the scheme in1999.Recently,Chien gave further a different approach to break the scheme and also proposed a modified scheme which can with-stands the security attacks found by Hwang and Chien.In this paper,authors do further cryptanalysis of scheme proposed by Wu and point out some other insecurity still involved in the scheme,of which Hwang and Chien have been unaware.
出处 《微电子学与计算机》 CSCD 北大核心 2003年第6期46-50,共5页 Microelectronics & Computer
关键词 安全漏洞分析 远程登录 几何特性 身份认证 智能卡 Remote login,Authentication,Euclidean,Plane geometry,Smart card
  • 相关文献

参考文献9

  • 1Brace Schneier.应用密码学:协议、算法和C源程序(第二版)[M].北京:机械工业出版社,2000..
  • 2Wu T C. Remote Login Authentication Scheme Based on a Geometric Approach. Computer Communications, 1995,18(12):959-963.
  • 3Hwang M S. Cryptanalysis of a Remote Login Authentication Scheme. Computer Communications, 1999,22:742-744.
  • 4Chien H Y, Jan J K, Tseng Y M. A Modified Remote Login Authentication Scheme Based on Geometric Approach. The Journal of Systems and Software, 2001, 55:287-290.
  • 5Van Oorschot P, Wiener M. A Known Plaintext Attack on Two-Key Triple Eneryption. In Advances in Cryptology-Eurocrypt'90. New York: Springer-Verlag, 1991:366-377.
  • 6Yuval G. How to Swindle Rabin. Cryptologia 3, 1979, 7:187-189.
  • 7Jacques Patarin. Collisions and Inversions for Damgard's Whole Hash Function. Asiacrypt, 1994, 307-321.
  • 8Chris Chames, Josef Pieprzyk. Attacking the SL2 Hashing Scheme. Asiacrypt, 1994,322-330.
  • 9Chang C C, Wu T C. The Study of an Irregular Triangular Mesh Generator, Proceedings of International Symposium on Applied Informaties. Innsbruck, Austria, 1990, 2: 228-233.

同被引文献27

  • 1孙淑华,马恒太,张楠,卿斯汉,王晓翠.后门植入、隐藏与检测技术研究[J].计算机应用研究,2004,21(7):78-81. 被引量:11
  • 2Wu Tzone-chen Remote Login Authentication Scheme Based on a Geometric Approach[J]. Computer Communications, 1995, 18(12): 959-963.
  • 3Wu Tzone-chen, He Weihua. A Geometric Approach for Sharing Secrets[J]. Computer & Security, 1995, 14(2): 135-145.
  • 4Hwang Min-shiang. Cryptanalysis of a Remote Login Authentication Scheme[J]. Computer Communications, 1999, 22(8): 742-744.
  • 5Chien Hung-yu, Jan Jinn-ke, Tseng Yuh-min. A Modified Remote Login Authentication Scheme Based on Geometric Approach[J]. Journal of Systems and Software, 2001, 55(3): 287-290.
  • 6Wang Shiuh-jeng. Yet Another Login Authentication Using N-dimensional Construction Based on Circle Property[J]. IEEE Trans. on Consumer Electronics, 2003, 49(2): 337-341.
  • 7Wang Shuhong, Bao Feng, Wang Jie. Comments on Yet Another Log-in Authentication Using N-dimensional Construction[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 606-608.
  • 8Yang Fuw-yi, Jan Jinn-ke. Cryptanalysis of Log-in Authentication Based on Circle Property[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 625-628.
  • 9Chor Leong-peng, Jing Hsu-wen, Chong Tan-peng. A Geometric Approach for Shared Secrets, a Refinement[J]. Computers & Security, 1998, 17(10): 725-732.
  • 10毛文波.现代密码学理论与实践[M].北京:电子工业出版社,2004:165-190.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部