Font Size: a A A

Based On Dynamic Password Research And Implementation Of Enterprise Instant Messaging System

Posted on:2013-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:X H MengFull Text:PDF
GTID:2248330374465201Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer network and communication technology, the real-time interactive, low cost and better coordination between staff has promoted itself another internet tool for modern enterprise communication besides telephone and Email. Making use of EIM can not only reduce the total cost, but also can greatly improve the efficiency. However, network virus, counterfeiting employees to steal trade secrets and other security issues have brought great harm to information construction of enterprise.Authentication is the first defense of Information Security System, various applications in past use simple username and password method, which is easy to leak and being overheard, so the security cannot be guaranteed. In order to improve the weaknesses of static password and improve the security, researchers add uncertain factors in the process of authentication, which make the password and authentication information different every time, this is the Dynamic Password Authentication technology.First, the paper reviews the research background and current research status, discusses the disadvantages of traditional static authentication and the classification and realization of dynamic authentication, studies the generating mechanism of dynamic password in dynamic authentication. Based on the defects of several classic schemes, a dynamic password authentication scheme is given to complete mutual authentication, which is based on the challenge/response mechanism, and uses a one-way hash function and RSA algorithm to generate a summary of certification information. The design of the scheme is the main job of the paper. The scheme is then analyzed for its safety and performance, including a comparison with some typical schemes. Then, it is applied in the EIM system. Finally, the paper is ended up with the discussion of further work.
Keywords/Search Tags:Authentication, Dynamic Password, Challenge/ResponseMechanism, Hash Function
PDF Full Text Request
Related items