Font Size: a A A

The Research And Design Of Dynamic Identity Authentication Based On Digital Sign Mechanism

Posted on:2015-05-09Degree:MasterType:Thesis
Country:ChinaCandidate:M DingFull Text:PDF
GTID:2298330452494217Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In modern times,the internet technology is widely popularization. Along with itproducting many security problems, such as malicious software wantonly events(suchas worm virus Flame), hacker attacks(such as wikipedia website under sustained attack), individual privacy leaks(such as the electricity accounts reveal,dropbox accountof Cloud storage stolen), operating system security events(such as the Android system) and the controversial prism door and so on.All this shows the network securityproblem has risen to the height of national strategy. Among the many network security stratege,identity authentication is the base of network security.This paper introduces the traditional static password identity authentication mechanism and its shortcomings,and such disavantages make it unable to ensure security.So the dynamic identity authentication technology emerges at the right moment,However,the traditional dynamic password authentication efficiency is so low and its security intensity is not high.This paper studys the technology of cryptography and its related theory,the digital signature technology and dynamic password authentication technology.Based on these,in this paper proposing a improved dynamic password authentication mechanism.This paper uses the MD5,improved ELGamal password algorithm,and combination with log numbers,and also improved every link it involves,such as the big primenumber generation phase in the ELGamal algorithm,large power modular arithmetic,the data storage in the database, the improvement of the authentication mechanismand so on,make it has the higher security an efficiency,Based on these,designs a improvement challenge/response authentication mechanism,makes it has higher securityand efficiency.Finally makes analysis and summary about its performance,security,accuracy,etc.And applying this kind of authentication mechanism to the cloud platform.
Keywords/Search Tags:elgamal public key cryptosystems, identity authentication, dynamicpassword, big prime number generated, hash function, challenge/responsemechanism
PDF Full Text Request
Related items