Font Size: a A A

A Research And Improvement For A Remote Authentication Protocol Based On Password

Posted on:2014-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z S CuiFull Text:PDF
GTID:2268330425466834Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of social economy and science and technology, computernetworks and network application also got rapid development. Due to the openness ofcomputer network, however, led to many security vulnerabilities and threats existed in thenetwork environment. Therefore, providing a kind of effective mechanism, to authenticatethe legal identity of users who want to access resource through the computer network hadbecome more and more important. The identity authentication technology had become oneof the most important technology in network system security.At present, the technology ofthe static password authentication was one of the more common identity authenticationtechnology. However, with the complication of network application and the diversificationof means of attack, due to security defects of the static password authentication, it could notmeet the network system and application security needs which had a high request for thesecurity. In view of the safety defects existed in the static password authenticationtechnology, people put forward the dynamic password authentication technology.This dissertation first to introduced the basic principle of dynamic passwordauthentication technology and implementation method in detail. Then a class ofpassword-based authentication scheme, that is, S/KEY password authentication scheme andSAS-2certification scheme were studied. Through analyzing and studying such certificationscheme of working process, performance and safety performance, analyzed of the existingsecurity defects, and put forward an improved authentication scheme SAS-3based onpassword, improved the security of the system.Based on the analysis of a class of dynamic password authentication scheme, this paperanalyzed Islam scheme of authentication and key negotiation process, and the existingsecurity defects in detail, and designed attack scheme for this, finally put forward a newremote authentication protocol based on passwords.
Keywords/Search Tags:network security, password, identity authentication, key agreement
PDF Full Text Request
Related items