Font Size: a A A

Research On Authentication Protocol With The Smart Card

Posted on:2014-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:C Y WangFull Text:PDF
GTID:2268330401482829Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of the network technology, online business is becomingmore and more prosperous. Because the Internet is an open platform, there are many securitythreats in the internet. In order to protect the security of the information transmitted on theinternet, many technologies come into being. Authentication is an important securitymechanism to protect the network and information security. Through authentication, anidentity is bound with an entity and one entity can prove to another entity that he has somekinds of claimed property.This paper studies the mutual authentication among three entities in the wireless networkand the establishment of the session key between two parties of the three entities. In theauthentication and session key establishment process, the privacy of the user is protected. Inthis paper, we consider the security of some authentication protocols based on smart cardfrom the aspects of symmetric cryptography and asymmetric cryptography and we proposedtwo new authentication protocols based on smart card.In this paper, the main results are as follows:1. First, we review the scheme of D. J. He et al which uses the public key certificate,analyze its security properties and computational efficiency, and propose an authenticationscheme (ID-A P)based on elliptic curve cryptography (ECC). The proposed scheme (ID-AP)’s security is based on the elliptic curve discrete logarithm problem. The efficiency analysisof the proposed scheme (ID-A P) is given and the result shows that it is more efficientcompared with the other schemes using public key certificate.2. We analyze several smart card-based remote authentication schemes, and make adetailed description of Mun et al’s scheme and its security vulnerabilities. We design a newremote authentication protocol (R-M-A P) to provide completely mutual authentication, andgive a detailed analysis of R-M-A P on both the efficiency and the security. The proposedR-M-A P is much more secure than Mun et al’s scheme, and its efficiency is higher than theprevious average remote authentication protocols.
Keywords/Search Tags:Smart Card, Mutual Authentication, Privacy Protection, WirelessCommunications, Key Establishment, Forgery Attack
PDF Full Text Request
Related items