Font Size: a A A

Studies On Password Authentication And Quantum Unequal-operation Authentication Protocols

Posted on:2014-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:J X PanFull Text:PDF
GTID:2248330395483958Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Authentication is the door of network security, which can prevent the invasion of illegal users.Based on it, two parties can communicate with each other. After long-term development, thetechnology of classical authentication is very skillful, but it relies on the security of computing. It isvery fragile in front of the attacker with strong computing power.Quantum authentication, by virtue of its unique quantum properties, is unconditionally securityand can detect attacks under the guarantee of the quantum no-cloning theorem and Heisenberguncertainty principle.This paper analyses some of the current authentication protocols and gives some improvementsor proposes new protocols. Firstly, the paper finds that the patent “online data encryption anddecryption” can’t resist the shoulder surfing attack. The paper improves it. The improvedauthentication protocol keeps the old one’s advantage, i.e., it needn’t transmit password. At thesame time, it can resist the shoulder surfing attack.Subsequently, this paper proposes a novel one-time password scheme based on sharing randomsub-password and permutation functions between user and server, which can produce almostcompletely random one-time passwords. This scheme can resist almost all current attack and costlow-computing power.Finally, this paper proposes a scheme to successfully attack a quantum authentication protocol.To improve it, this paper proposes a novel quantum authentication protocol, which uses the idea“unequal operation”. At the same time, it also uses classical Turbo code to realize error correction.With simulations, this scheme can realize the identity authentication and quantum key distributionwithout classical comparisons.
Keywords/Search Tags:authentication, quantumcryptography, should-surfing attack, One-time password, random sub-password, unequal operation
PDF Full Text Request
Related items