期刊文献+

基于Hash函数的远程口令认证方案的改进

Improvement of remote password authentication scheme based on one-way Hash function
下载PDF
导出
摘要 指出了Xue-Kong的基于单向哈希函数的远程口令认证方案易遭受不可检测在线口令猜测攻击,针对上述安全漏洞,构造了一个基于随机数和Hash函数、使用智能卡的远程口令认证和密钥协商协议。技术分析表明提出的改进方案是安全的。 It shows that Xue-Kong’s remote password authentication scheme based on one-way Hash function cannot resist undetectable on-line password guessing attack.To overcome the weakness,an improved scheme based on nonce and Hash function is proposed.Technical discussions are provided to show that the improved protocol is secure.
作者 项金萍 谢琪
出处 《计算机工程与应用》 CSCD 北大核心 2011年第19期105-107,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.10671051 浙江省自然科学基金(No.Y1080831)~~
关键词 认证 智能卡 双向认证 不可检测在线口令猜测 user authentication smart cards mutual authentication undetectable on-line password guessing attack
  • 相关文献

参考文献13

  • 1Lamport L.Password authentication with insecure communication[J]. Communications of ACM, 1981,24 ( 11 ) : 770-772. 被引量:1
  • 2Hwang M S,Li L H.A remote user authentication scheme us- ing smart card[J].IEEE Transaction on Consumer Electronics, 2000,46( 1 ) :28-30. 被引量:1
  • 3Sun H M.An efficient remote user authentication scheme using smart cards[J].IEEE Transaction on Consumer Electronics,2000, 46(4) :958-961. 被引量:1
  • 4Wu S T, Chieu B C.A user friendly remote authentication scheme with smart eards[J].Computers & Security,2003,22(6): 547-550. 被引量:1
  • 5Wu W T, Chieu 13 C.A note on a user friendly remote authenti- cation scheme with smart cards[J].IEICE Trans on Fund, 2004, E87-A(8) :2108-2181. 被引量:1
  • 6Shieh W G, Wang J M.Efficient remote mutual authentication and key agreement[J].Computers and Security, 2006, 25(1): 72-77. 被引量:1
  • 7薛素静,孔梦荣.基于单向哈希函数的远程口令认证方案[J].计算机应用研究,2008,25(2):512-515. 被引量:6
  • 8Fan C, Chan Y, Zhang Z.Robust remote authentication scheme with smart cards[J].Computers & Security, 2005,24(5) : 619-628. 被引量:1
  • 9Juang W S.Efficient password authenticated key agreement us- ing smart card[J].Computer & Security,2004,23 : 167-173. 被引量:1
  • 10张利华,章丽萍,张有光,吕善伟.基于口令的远程身份认证及密钥协商协议[J].计算机应用,2009,29(4):924-927. 被引量:10

二级参考文献51

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2Bellare M, Rogaway P. Entity authentication and key distribution// Proc. of Crypto ' 93, LNCS773. Berlin, Heidelberg: SpringerVerlag, 1994 : 232-249 被引量:1
  • 3Bellare M , Rogaway P. Provable - secure Session Key Distribution:The Three Party Case//Proc. of the 27^th Annual Symposium on the Theroy of Computing. ACM Press, 1995:57-66 被引量:1
  • 4Bellare M, Pointcheaval D, Rogaway P. Authenticated key exchange secure against dictionary attacks//Proc, of Eurocrypt' 00, LNCS 1807. Berlin, Heidelberg: Springer-Verlag, 2000 : 139- 155 被引量:1
  • 5Bresson E, Chevassut O, Pointcheval D. Dynamic Group Diffie- Hellman Key Exchange under Standard Assumption (Full version)//Proc, of Eurocrypt ' 02, LNCS 2332. Berlin, Heidelberg: Springe-Verlag, 2002 : 321-336 被引量:1
  • 6Bresson E, Chevassut O, Pointeheval D, et al. Provably Authenticated Group Diffie-Hellman Key Exchange//Proc. of 8th ACM CCS. ACM Press, 2001:255-264 被引量:1
  • 7Bresson E , Catalano D. Constant Round Authenticated Group Key Agreement via Distributed Computation//Proc. of Public- Key Cryptgraphy, LNCS 2947. Berlin, Heidelberg: Springer- Verlag,2004:115-129 被引量:1
  • 8Steiner M, Tsudik G, Waidner M. Key Agreement in Dynamic Peer Groups. IEEE Trans. on Parallel and Distributed Systems, 2000,11(8):769-780 被引量:1
  • 9Burmester M , Desmedt Y. A Secure and Efficient Conference Key Distribution System//Proceedings of Euroerypt ' 94, LNCS 950. Berlin, Heidelberg: Springer-Verlag, 1995 : 275-286 被引量:1
  • 10Burmester M, Desmedt Y. A Secure and Scalable Group Key Exchange System. Information Processing Letters, 2005, 94 (3) : 137-143 被引量:1

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部