Font Size: a A A

Biometric-based Smart Card Remote Authentication Protocol

Posted on:2011-02-13Degree:MasterType:Thesis
Country:ChinaCandidate:H F MaFull Text:PDF
GTID:2208360308466229Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Nowadays, the technology of the computer, the network and the communication is developing fast, and the information is expanding. How to protect the information's reliablility and authenticity has become one of the hotest topics. Information is also called data. The security of the data in network certainly will bring along the fast development of the cryptography and the technology of authentication. Encryption can carry out the data's confidentiality. Authentication can realize the reliablility of the entity and the integrity of the data. Then, the first task to protect the network information's security is to validate the entity's identity. There exist kinds of technologies of identity-authentication. Static password authentication, which has many flaws, is the original manner. The technology of smart-card and dynamic password has enhanced the security very much. But there are many problems, too. So, biometrics will be imported to the authentication system to provide more secure strategies for authentication's reliability and realness.Hash function is one encryption mothed, which is efficient and easy to carry out. The analysis of remote authentication based on the biometric, smart card and password, whose security is built on the hash problems, is very popular. Lee et al.'s protocol and many other experts'analysis of the flaws existing in the protocol will be reviewed first. And then, the correlative improved protocols will be researched. Those protocols are all based on hase and exclusive-or functions. So, they are simple and easy to implement. They can also provide much more secure service. However, there exists impersonation attacks and so on. The flaws existing in Khan et al.'s protocol and Yoon et al.'s protocol will be analyzed and summarized detailedly and their protocols'rest shortages will be gave out, too. At last, an improved and efficient remote authentication protocol, which is based on biometrics, smart card and password, will be proposed. Because it only ueses simple hash and exclusive-or operations, the new protocol is simple and easy. At the same time, it can remedy any kind of shortages existing in the protocols above, too.Recently, the cryptography based on bilinear-pairings becomes widespread. The researches of the identity authentication protocols based on bilinear-pairings is becoming more and more popular. It will begin with the research of the smart card and password authentication protocol. The flaws in Das et al.'s protocol, Chou et al.'s protocol and Jia et al.'s protocol will be analyzed and summed up. Also, our attacks to every protocol will be gave out. Based on the protocols above, Pathan et al.'s protocol will be analyzed in details and the flaws in it will be fingered out. In order to achieve the security of the remote identity authentication and to keep the secret information, such as password, confidential, biometrics will be imported and a new identity authentication protocol based on biometrics, smart card and password, whose security mainly depends on the bilinear-pairings problems, will be put forward, too. The new protocol, not using public-key encryption, has low computation cost.
Keywords/Search Tags:Biometrics, Smart-Card, Password, Hash-Function, Bilinear-Pairings
PDF Full Text Request
Related items