Font Size: a A A

The Design And Implementation Of Remote User Authentication Scheme Using Smart Cards

Posted on:2013-11-12Degree:MasterType:Thesis
Country:ChinaCandidate:H YangFull Text:PDF
GTID:2248330362465676Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Internet is an open network system, which is changing the way of our work andlife. Because of its openness, there are many security holes in the computer network.The attackers manage to illegally access some network resources through variousmalicious attacks. It’s important to provide a secure way to simultaneously protect theinterests of both the service provider and the users. Therefore, mutual authenticationbetween them becomes very necessary.In allusion to these security flaws existing in Yeh et al.’s protocol, this paperproposes an improvement scheme based on smart cards with reasonable cost andhigher efficiency. Our design adopts an anonymous technique called doublepseudonyms, which enables server to identify irrelevant requesting information ofusers. In this way, it can effectively prevent the attacker’s track and the server can alsoauthenticate the users availably. This method does not use public key encryptiontechnology, but only one-way hash function and exclusive-or operation. As a result,compared with the former scheme, there is a great advance of this design in safety,simultaneously, it keeps some advantages such as higher computation efficiency andlower communication costs.This paper analyzes the security and performances of the design in detail.Moreover, it have realized the scheme in Eclipse platform and verified its feasibility.
Keywords/Search Tags:authentication, security, smart card, pseudonym, hash function
PDF Full Text Request
Related items