期刊文献+

基于一次性口令技术的远程安全访问 被引量:1

Remote Secure Access Based on OTP technology
下载PDF
导出
摘要 针对远程安全访问中的用户鉴别问题 ,本文提出利用一次性口令认证产生的散列结果作为IKE协议使用的共享密钥 ,然后将该散列结果进行再散列后作为一次性口令计算结果 ,安全网关则采用相同的运算步骤 ,如果安全网关计算的一次性口令结果和用户传来的一次性口令相同 ,则安全网关将共享密钥加载到安全网关中进行安全关联的协商 .此方法成功解决了对于大量远程用户的共享密钥分配问题 ,同时该方法不对一次性口令的安全性产生任何影响 . Aimed at the problem of user authentication on remote secure access, this paper presents a method that takes the hash-result of OTP as the share-key of IKE and rehashes the hash-result sent to Secure Gateway (SG) and then SG takes the same steps above. When the hash-result of OTP calculated by SG is equal with what was transferred from users , SG loads the hash-result to IKE modules and proceeds to negotiate with the Security Association. The method successfully solves the problems of distribution of secret keys under a vast amount of remote users by means of distributing the users only usernames and passwords while distribution of a large number of share-keys is avoided. Consequently, authentication and management of remote users turns to be facilitated. At the same time, it is proved that no effect on security of OTP was produed.
机构地区 四川大学
出处 《小型微型计算机系统》 CSCD 北大核心 2003年第12期2086-2087,共2页 Journal of Chinese Computer Systems
基金 国家自然科学基金 (60 0 730 4 6)资助
关键词 一次性口令 远程访问 网络安全 用户鉴别 口令认证 OTP remote access security
  • 相关文献

同被引文献10

  • 1Condell M, Lynn C, Zao J. Security Policy Specification Language[R].Internet Draft, 1999-07.
  • 2Sanchez L A, Condell M N. Security Policy Protocol[R]. Internet Draft, 1999-07.
  • 3Pereira R, Bhattacharya R IPSec Policy Data Model[R]. Internet Draft, 1998-02.
  • 4Sanchez L A, Condell M N. Security Policy System[R], Internet Draft,1998-11.
  • 5Sandhu R, Samarati E Access Control: Principles and Practice[J].IEEE Communication Magazine, 1994, 32(9): 40-48.
  • 6Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models[J]. IEEE Computer, 1996, 29(2):38-48.
  • 7Object Management Group. Common Secure Interoperability V2 Specification[R]. 2001-04.
  • 8Kent S, Atkinson R. Security Architecture Ibr the Internet Protocol[S].RFC2401, 1998.
  • 9Enabling Virtual Private Networks with Public Key Infrastructure[R].SSH Communications Security Corp, 2002-03.
  • 10Laat C D. Generic AAA Architecture[S]. RFC 2903, 2000-08.

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部