Font Size: a A A

Research And Improvement Of Password Authentication Of PostgreSQL Based On Elliptic Curve

Posted on:2009-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:W XiaoFull Text:PDF
GTID:2178360242474706Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Human society has entered an information society. The development of social economy depends on information resource,information technology and information industry more and more. Identity authentication is an effective method to ensure information security. It plays an important role in information system. Identity authentication on which other security services depend is a basic security service. So studying on identity authentication technology has much meaning in protecting information and expediting information security construction.This article firstly presents some introductive materials, including database identity authentication and the motivations and the developments of the password authentication of database. Then, this paper introduces the main identity authentication technology of database and its significances. Thirdly, we present an extensive study of the system architecture of PostgreSQL and introduce several identity authentication methods in PostgreSQL. Fourthly, this paper introduces the mathematical basis of elliptic curve of finite fields and studies carefully the selected issues in elliptic curve. Fifthly, we proposed a new password authentication method of PostgreSQL based on Elliptic Curve, presented the main idea of the method. Sixthly, we design and implement the new method, the results show that we implement sever and client two-way authentication, prevent middleman attack,guessing attack and tampered attack. Compared to the other password authentication methods, the new method can use shorter keys to reach the same security as RSA. On the other hand, the new method is implemented through using NIST recommendation elliptic curve, doesn't need to establish elliptic curve and guarantees the efficiency. After using the new method in practice, we get a good result. Finally, the advantages of the new method and the trend in password authentication of database and research direction are discussed.
Keywords/Search Tags:network security, identity authentication, elliptic curve, PostgreSQL, password authentication
PDF Full Text Request
Related items