首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于混沌理论的身份认证方案
引用本文:姜楠,杨德礼,王德高.基于混沌理论的身份认证方案[J].吉林大学学报(理学版),2008,46(4):711-715.
作者姓名:姜楠  杨德礼  王德高
作者单位:1. 大连理工大学 系统工程研究所, 辽宁 大连 116024; 2. 大连民族学院 计算机科学与工程学院, 辽宁 大连 116600
摘    要:基于混沌理论和一次性口令认证技术, 提出一种可以抵御常见攻击的身份认证方案. 解决了常规一次性口令认证方案不能抵御小数攻击、 明文传送迭代次数不安全以及传统Hash函数存在易于找到碰撞安全漏洞的问题, 该方案用混乱和散布性质好、 抗碰撞能力强的混沌Hash函数代替传统的Hash函数, 用混沌置乱排序算法产生的迭代次数代替网上明文传输的迭代次数, 具有较高的安全性.

关 键 词:份认证  混沌Hash函数  一次性口令  
收稿时间:2007-12-03

Identity Authentication Scheme Based on Chaotic Theory
JIANG Nan,YANG De-li,WANG De-gao.Identity Authentication Scheme Based on Chaotic Theory[J].Journal of Jilin University: Sci Ed,2008,46(4):711-715.
Authors:JIANG Nan  YANG De-li  WANG De-gao
Institution:1. Institute of Systems Engineering, Dalian University of Technology, Dalian 116024, Liaoning Province, China;2. School of Computer Science and Engineering, Dalian Nationality University, Dalian 116600, Liaoning Province, China
Abstract:Based on chaotic theory combined with one time password authentication technology, an identity authentication scheme was presented which can resist attacks in common and resolve ordinary one time password unresisting small number attack and insecurity problems of transmitting plaintext iteration times and easily finding the security leak of collisions in traditional Hash function. In this scheme, traditional Hash function was substituted with chaotic Hash function of more safety about confusion and diffusion, stranger resistant collision ability, and plaintext iteration times was substituted with scramble sort algorithm generated iteration times in network, so it is more safety.
Keywords:identity authentication  chaotic Hash function  one time password
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《吉林大学学报(理学版)》浏览原始摘要信息
点击此处可从《吉林大学学报(理学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号