期刊文献+

一种基于Diffie-Hellman密钥交换协议的OTP方案 被引量:1

An OTP Scheme Based on Diffie-Hellman Key Exchange Protocol
在线阅读 下载PDF
导出
摘要 分析了常见的几种一次性口令身份认证方案,提出了一种基于Diffie-Hellman密钥交换协议OTP方案。该方案不仅能够有效地保护用户的身份信息,而且安全性好,执行效率高,能提供通信双方的相互认证,能防止假冒攻击、中间人攻击、重放攻击等多种攻击方式。最后对该方案的安全性进行了剖析。 Several common one-time password identity authentication schemes are analyzed.An OPT scheme based on Diffie-Hellman key exchange protocol is put forward.The scheme not only can protect the user s identity information effectively,but also has good safety and high executive efficiency.It can provide mutual authentication between both sides of communication,prevent fake attack,man-in-the-middle attack,replay attack,etc.Finally,the security of the scheme is analyzed in detail.
作者 方俊
出处 《计算机时代》 2009年第11期24-26,共3页 Computer Era
关键词 身份认证 一次性口令 HASH函数 DIFFIE-HELLMAN identity authentication one-time password Hash function Diffie-Hellman
  • 相关文献

参考文献1

二级参考文献7

  • 1H Y Chien,J K Jan,Y M Tseng.An Efficient and Practical Solution to Remote Authentication:SmartCard[J].Computers & Security,2002,21(4):372-375.
  • 2Wei-Chi Ku,Shuai-Min Chen.Weakness and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards[J].IEEE Transactions on Consumer Electronics,2004,50(1):204-207.
  • 3NIST Brief Comments on Recent Cryptanalytic Attacks on Secure Ha-shing Functions and the Continued Security Provided by SHA-1[EB/OL].http://csrc.nist.gov/hash_standards_comments.pdf,2004.
  • 4Haller N,R Atkinson.On Internet Authentication[S].RFC 1704,1994.
  • 5L Lamport.Password Authentication with Insecure Communication[J].Communication of ACM,1981,24:770-772.
  • 6C J Mitchell,L Chen.Comments on the S/KEY User Authentication Scheme[J].ACM Operating System Review,1996,30(4):12-16.
  • 7Rigney C,Rubens A,Simpson W.Remote Authentication Dial in User Service (RADIUS)[S].RFC 2138,1997.

共引文献17

同被引文献5

  • 1尹少平,董丹.Diffie-Hellman密钥交换协议设计与实现[J].电力学报,2006,21(1):9-12. 被引量:9
  • 2张世勇.网络安全原理与应用[M].北京:科学出版社.2003.59-280.
  • 3Claessens J, Diaz C, Goemans C. Revocable anonymous access to the Intemet[J]. Int Research Electr Networking Appli and Policy, 2003 (2) : 13.
  • 4Atul Kahate.密码学与网络安全[M].2版.金名译.北京:清华大学出版社,2009.
  • 5Stallings W.密码编码学与网络安全--原理与实践[M].4版.孟庆树,王丽娜,傅建明,等译.北京:电子工业出版社,2008.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部