Font Size: a A A

Research On Secure Authentication Protocols

Posted on:2008-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:L J CengFull Text:PDF
GTID:2178360242972251Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the fast development of the global information technology, information security is becoming increasingly severe and the safeguarding-security function to the information systems of secure authentication is more and more evident, so researching the secure authentication protocol is very necessary. This thesis studies three kinds of secure authentication protocols. And its main work are listed as bellow:1. The S/KEY-like authentication protocols are discussed. Two protocols of this kind, named TAOTP AND E-S/KEY, are analyzed. The analysis shows that the two protocols both have limitations, and don't have the security that the designer said. A new IC-based S/KEY-like protocol is designed, which can achieve two-way authentication, and efficiently resolves the problem of login count and password resetting. So it has some practicability.2. The SAS-like authentication protocols are discussed. A composite attack model to SAS-like system is given. Three protocols of this kind are vulnerable to this attack model. To resist it, some tackling strategies and secure mechanisms are proposed. Then the protocol named SEPA is analyzed and the result shows that it is vulnerable to denial of service attacks. An advanced protocol is given, which conquers the SEPA's attack, so it is securer and more practical.3. The Bilinear Pairings-based authentication protocols are discussed. One protocol of this kind is cryptanalyzed, and forgery attack to it is constructed. A new protocol that doesn't tie to any encryption system was designed, and the legitimacy, security and expansibility of it are analyzed.
Keywords/Search Tags:Authentication, Cryptographic Protocols, S/Key, SAS-like, Bilinear Pairings
PDF Full Text Request
Related items