Font Size: a A A

Research On Network Security Authentication Protocol Based On Chaos Theory

Posted on:2018-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhangFull Text:PDF
GTID:2348330542990832Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the continuous innovation and progress of information technology,many of the traditional work has been gradually information,such as the traditional paper examination has been in the online examination to change,so the safety of online examination has become particularly important,only to ensure that the online examination of information security In order to ensure fairness and fairness of online examinations.And identity authentication in the information security has a very important position,identity authentication once the line of defense was broken,then all the other protective measures will be one by one to crack the security of the entire system will not be able to get the appropriate protection.The Kerberos protocol is the most mature and widely used authentication protocol in all existing authentication protocols.It is a three-party authentication protocol in C / S mode,but it also has problems such as difficulty in key distribution,Put the attack and other issues.In view of the above problems,the main research work of this thesis is as follows:Through the research and analysis of the Kerberos protocol,it points out that there are three problems in the existing Kerberos protocol: the AES algorithm used in the Kerberos protocol as encryption for encryption and encryption requires encryption and decryption.Memory allocation difficult problem;AES encryption key expansion algorithm generated by the key space is limited due to the problem caused by the square attack;by the Kerberos protocol server server time is difficult to synchronize the vulnerability caused by the problem of replay.In order to solve the above problems,the IKC protocol is used to replace the original method in the original Kerberos protocol as the AES algorithm for data encryption and the serial number,random number and message queue method.Among them,RAHVC algorithm uses RSA encryption and AES encryption mixed method instead of the original Kerberos protocol as data encryption AES algorithm,so that AES key can be generated in real time before encryption,a good solution to the existence of AES encryption key storage Difficult to manage.At the same time,the RAHVC algorithm is based on the good chaos and randomness of the chaotic system.Based on the AES algorithm,the chaotic sequence is used instead of the key extension of the AES algorithm in the original Kerberos protocol,which solves the AES algorithm The key space is limited by the problem of vulnerable to Square attacks.The combination of serial number,random number and message queuing is based on the timestamp of the original Kerberos protocol,adding serial number,random number and message queue,so that the improved protocol can effectively resist the replay attack.Finally,the theoretical analysis and simulation experiments show that IKC protocol can be a good solution to the problem of key distribution,and can well resist Square attack and replay attacks,enhance the security of Kerberos protocol can be more secure and efficient Authentication.
Keywords/Search Tags:Kerberos, Chaotic-theory, Logistic-map, AES, RSA
PDF Full Text Request
Related items