期刊文献+

一种安全的双向匿名口令认证方案 被引量:3

A Secure Mutual Password Authentication Scheme with User Anonymity
原文传递
导出
摘要 改进了Hwang-Yeh方案,提出了一种新的匿名口令认证方案。新方案采用匿名和隐藏口令等方式,弥补了Hwang-Yeh方案的安全缺陷,能抵抗更多的安全攻击,如服务器欺骗、伪造攻击等。新方案与Hwang-Yeh方案、Peyravian-Zunic方案以及Peyravian-Jeffries方案进行了安全性比较分析。结果表明,在不安全网络通信中,新口令认证方案具有更高的安全性和实用性。 A new improved password authentication scheme is proposed, which is user anonymity, can fix the Hwang-Yeh's scheme and provide more other security properties such as server spoofing attacks, forge attacks, etc. According to security properties comparisons a- mong Peyravian-Zunic's scheme, Hwang-Yeh's scheme, Peyravian-Jeffries scheme, and our proposed scheme, the proposed scheme is more secure and practical over insecure network.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第10期1073-1075,1079,共4页 Geomatics and Information Science of Wuhan University
基金 国家自然科学基金资助项目(60373087,60473023)
关键词 口令 口令认证 哈希函数 攻击 password password authentication Hash function attack
  • 相关文献

参考文献10

  • 1Diffie W, Hellman M E. New Directions in Cryptography [J]. IEEE Transactions on Information Theory, 1976, IT- 22 (6): 644-654 被引量:1
  • 2Lamport L. Password Authentication with Insecure Communication [J].Communications of the ACM,1981, 24:770-772 被引量:1
  • 3Peyravian M, Zunic N. Methods for Protecting Password Transmission [J]. Computer & Security, 2000, 19(5):466-469 被引量:1
  • 4Tsudik G. Message Authentication with One-way Hash Functions. ACM SIGCOMM Computer Communication Review, 1992, 22(5): 29-38 被引量:1
  • 5Lee C C, Li L H, Hwang M S. A Remote User Authentication Scheme Using Hash Functions. ACM Operating Systems Review, 2002, 36 (4) :23- 29 被引量:1
  • 6Hwang J J, Yeh T C. Improvement on Peyravian- Zunie's Password Authentication Schemes[J]. IEICE Transactions on Communications, 2002, E85-B (4) :823-825 被引量:1
  • 7Chun L L, Hwang T L. A Password Authentica tion Scheme with Secure Password Updating[J]. Computers & Security, 2003, 22(1): 68-72 被引量:1
  • 8Chang Y F, Chang C C, Liu Y L. Password Authentication without the Server Public Key [J]. IEICE Transaction on Communications, 2004, E87-B (10): 3 088- 3 091 被引量:1
  • 9Peyravian M, Jeffries C. Secure Remote User Access over Insecure Networks [J]. Computer Communications, 2006, 29(5/6): 660-667 被引量:1
  • 10Ku W C, Chen C M, Hui L. Cryptanalysis of a Variant of Peyravian-zunic's Password Authentication Scheme [J]. IEICE Transaction on Communications, 2003, E86-B (5): 1 682-1 684 被引量:1

同被引文献30

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部