Font Size: a A A

The Study, Based On The Authentication Technology Of Information Hiding

Posted on:2003-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:X T DuFull Text:PDF
GTID:2208360092498932Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Identification & Authorization is an important part of information security and is the base and precondition of security operating system.The traditional Password Authentication technology username/key pair and OTP(Once Time Password) is analyzed and its security flaws are pointed out in this study. Tra_Rijndael algorithm is designed.An authentication scheme which combines password, remote authentication mechanism based on Tra_Rijndael algorithm and local authentication mechanism based on fingerprint identification is also proposed.The result of this study which provides a friendly user interface is also used in the BlueShield Security OS of National University of Defense Technology.This paper presents the security OS architecture and the basic concepts of Identification & Authorization,analyses the background and significance of the project.Then,there is study of the authentication scheme based on the theory of Information Hiding,including the definition ,model and characteristic of Information Hiding,the security and flow of Tra_Rijndael algorithm,the theory of image loading key, the PAM module application. This Authentication scheme based on the theory of Information Hiding combine the encryption algorithm and image efficiently and ensure greater security in the password storage and transmission. Combined the interface form of FDS2000 fingerprint machine,this paper expatiates on the design and implementation of local authorization scheme based on the fingerprint identification.At last,the author gives a summary of all the work,and put forward the successive destination.
Keywords/Search Tags:Rijndael, Identification&Authorization, Password Authentication, Image, Security OS, Encryption, PAM module, Fingerprint Identification
PDF Full Text Request
Related items