期刊文献+

一种基于智能卡的双向身份认证方案 被引量:7

A Two-way User-identity Authentication Scheme based on Smart Card
原文传递
导出
摘要 计算机网络的普及使更多的资源和应用可以利用网络远程获得,所以身份认证问题成为网络安全研究中的重要课题。当前主要的身份认证方法有以下几种:基于口令的身份认证;基于生物特征的身份认证;基于智能卡的身份认证以及几种方式的混合认证。结合密码学和智能卡技术的身份认证方案也被多次提出,许多专家和学者还提出了多种改进的方案。但是,这些方案均会出现一些不可避免的漏洞。针对多种方案的漏洞,该文提出了一种在智能卡中引入公钥密码算法的认证方案,并对其安全性进行了分析,该方案的安全性和优越性也在文中得到体现。 Computer network popularization indicates that more resources and applications could be remotely obtained by network,so the user-identity authentication becomes an important topit in the research of network security.The current major identity authentication methods includes: identity authentication,based on password,identity authentication,based on biological characteristics identity authentication based on smart card,and several ways of mixed authentication.The user-identity authentication scheme in combination of cryptography with smart card technology is suggested repeatedly.However,all of those schemes would have some inevitable loopholes.With regard to those loopholes,this paper proposes an authentication scheme,in which the public key cryptography algorithm is introduced in the smart card,and the security is also analyzed.
作者 高亮 方勇
出处 《通信技术》 2011年第2期85-86,90,共3页 Communications Technology
关键词 身份认证 智能卡 公钥算法 安全分析 authentication smart card public key cryptography security analysis
  • 相关文献

参考文献8

二级参考文献17

  • 1刘晓莹,祝跃飞.ECC在智能卡上的实现[J].计算机应用与软件,2004,21(8):1-3. 被引量:7
  • 2Kocher P, Jaffe J, Jun B. Differential power analysis[C].In:CRYPTO' 99: Advances in Cryptology, Berlin: Springer Verlag, 1999:388-397.
  • 3Messerges T S, Dabbish E A, Sloan R H. Examining smart-card security under the threat of power analysis attacks[J]. IEEE Transactions on Computers, 2002,51(5):541-552.
  • 4Hwang T, Ku W C. Reparable key distribution protocols for internet environments[J]. IEEE Transactions on Communications, 1995,43(5):1947-1950.
  • 5N Koblitz. Elliptic curve cryptosystems [ J]. Mathematics of Computation,1987 ,48 (177) :203 -209.
  • 6Darrel Hankerson, Alfred Menezes, Scott Vanstone. Guide to Elliptic Curve Cryptography [ M ]. Springer - Verlag New York, Inc 2004.213 - 225.
  • 7Joseph K Liu, et al. Multi - Application Smart Card with Elliptic Curve Cryptosystem Certificate IEEE[ M]. Knowledge- Based Intelligent Electronic Systems, 1998.
  • 8Khan M K, Zhang J S, Improving the Security of 'A Flexible Biometrics Remote User Authentication Scheme' [J]. Computer Standards &Interfaces, 2007, 29(01):82-85.
  • 9Messerges T S, Dabbish E A, Sloan R H. Examining Smart-card Security Under the Threat of Power Analysis Attacks[J]. IEEE Transactions on Computers, 2002, 51(05):541-552.
  • 10Yang W H, Shieh S P. Password Authentication Schemes with Smart Cards[J]. Computers and Security, 1999, 18(08):727-733.

共引文献40

同被引文献37

引证文献7

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部