Font Size: a A A

Research And Application Of Fingerprint Encrypt-based Authentication In Networking Environment

Posted on:2006-01-19Degree:MasterType:Thesis
Country:ChinaCandidate:F ChenFull Text:PDF
GTID:2168360152483169Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Authentication technology is very important in network system, which provides the basis for access control. Communication securities almost begin with verifying the identity of a user. So Authentication mechanism has a very important effect on the whole network system. There are many techniques to implement authentication, but relative to traditional authentication technology, fingerprint-based identification technology is an effective method to solve the identity authentication in networking environment. Therefore, how to use fingerprint-based authentication technology in networking environment is a question we should to research.After summarizing the actuality and the development of the identity authentication technology in information safety, and evaluating the merit and the disadvantage of some authentication mechanism, this paper discusses the encrypt arithmetic and fingerprint-based authentication technology, designs a authentication protocol based on fingerprint encryption and based on this protocol, an authentication system is developed. The contents of the paper are listed as follow:1. Design an authentication protocol based on fingerprint encryption. According to the requirement of authentication protocol, after analyses the security and technique requirement of the protocol, this paper ascertains the actor in the protocol and describes implement process of the protocol.2. BAN logic formal analysis of authentication protocols. BAN logic can be used to reason about security properties of protocols. There are five steps to analyses the protocol: â‘  Idealize the protocol in the language of the formal logic. â‘¡ Identify initial security assumptions in the language of BAN logic. â‘¢ Attach the Logical formulas to the statements of the protocol. â‘£ Use the productions and rules of the logic to deduce new predicates. ? Interpret the statements that has proved by this process.3. Develop an authentication system in network environment to detect the ability of the system in ensuring the security of authentication information and resisting Stolen-Verifier and Replay attack.
Keywords/Search Tags:Identity Authentication, Protocol, Fingerprint, Encrypt, BAN logic
PDF Full Text Request
Related items