Font Size: a A A

The Research Of Dynamic Id Based Authentication With Key Agreement Scheme

Posted on:2015-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z WangFull Text:PDF
GTID:2298330467963345Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
In recent years, the rapaid development and widespread use of the Internet have accelerated the rhythm and pace of the information society, and information system has also been more widely used in political, military, scientific economic and other fields. However, because the information network has the special characteristics of social, sharing and openness, it brings the opportunities for the society, at the same time, it also brings a huge security threat. If the problem of information security is not solved, the information security based applications will not be carried out. Therefore, information security has become a focus of attention, and identity authentication, as the first line of defense in the security system, plays an important role in the information system.Identity authentication is a process that the computer network confirms the operator’s identity. In recent years, the dynamic ID-based authentication mechanism is widely used, which effectively combines the factors such as password and smart card to ensure the anonymity of users and improves the security of authentication mechanism. In this dissertation, we study the dynamic ID-based authentication with key agreement protocol, and point out the security flaws existed in some of the existing protocols, besides, we design more efficient and more secure schemes by using hash function and other algorithms. The main work of this dissertaton is as follows:1. we analyze the Lee et al.’s dynamic ID based remote user authentication with key agreement scheme for multi-server environments, point out that their scheme cannot resist the smart card stolen attack and malicious server attack, and their scheme also cannot guarantee the user’s anonymity. In response to these security flaws, we propose an improved authentication scheme for multi-server environments and analyze the security and efficiency of the improved scheme. In the improved scheme, the registration center is directly involved in the certification process between the user and the server, which not only meets the security requirements of the authentication protocol, but also can achieve functional goals.2. we analyze the Li et al.’s dynamic ID and smart card based authentication scheme, point out that this scheme exists some security weaknesses, for example, it cannot resist smart card stolen attack and offline password guessing attack. In order to remedy these security weaknesses, we propose an improved scheme based on Li et al.’s scheme, which achieves the directly secure authentication between the user and the server without the help of registration center, and also can remedy the shortcomings of registration center offline mechanism. The analysis and comparison of security and efficiency show that the improved scheme takes only a small increment in compute cost can exchange for the higher security and availability, namely the improved scheme achieves the balance between the security and efficiency.
Keywords/Search Tags:identity authentication, smart card, key agreement, password, multi-server environment
PDF Full Text Request
Related items