Font Size: a A A

The Design And Implementation Of The Dual Factors Identity Authentication Based On ECC

Posted on:2008-02-28Degree:MasterType:Thesis
Country:ChinaCandidate:Z G CengFull Text:PDF
GTID:2178330332481826Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network and the popularization of Internet, Electronic Commerce,E-Government, Intranet and Internet Information Service have been extensively used now. Therefore, the security of Internet is emphasized more and more by people. As we know,the identity authentication can prevent illegal user from accessing system of network and visiting the controlled information,so it is not only the first protecting line of the network application system, but also the gateway of a secure network system. Therefore,to establish a strong identity authentication mechanisms is the key to the network security.First of all, the elliptic curve and the technical of cryptogram which refer to this paper are discussed.And the advantages and disadvantages of Several identity authentication have been analysed in the paper.Secondly,on the base of the in-depth study of the advantages and the security of Fingerprint Identification Technology, Dynamic Password Authentication and Elliptic Curve Cryptography (ECC), the Potential safety problems of Fingerprint Identification and the security loopholes of Dynamic Password Authentication have been pointed out.So a enhanced two-factor identity authentication scheme which unifies Fingerprint Identification Technology, Dynamic Password Authentication and Elliptic Curve Cryptography has been designed. In the new scheme the Potential safety problems of Fingerprint Identification and the security loopholes of Dynamic Password Authentication have been solved. In the identity authentication process of the new scheme, the security of the identity authentication has been enhanced,because not only the two-way identity authentication but also the stochastic combination of Fingerprint sequence which will be tested by the sever has been implemented. Besides, a new method of Auto-adapted threshold which can solve the binarization of poor quality images with different gray depth has been designed;What is more, in order to achieve the data encryption rapidly and effectively,the method of Fast generation of secure elliptic curves and Fast Point Multiplication has been implemented.Finally, the scheme,which not only is confidential, reliablility, effectiveness and security and but also can keep the system from imitate attack, replay attack,small password guessing attack, has detailed designed and accomplished.
Keywords/Search Tags:Identity Authentication, Dynamic Password Authentication, Fingerprint Identification, elliptic curve
PDF Full Text Request
Related items