Font Size: a A A

Research On Authentication Based On Chaotic Map

Posted on:2018-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:J F ZhouFull Text:PDF
GTID:2348330569486447Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the high-speed development of mobile internet,more and more people are going to use mobile terminal to exchange information and share network resource.In the actual network applications,the system or the mobile terminal firstly authenticate whether the real identity of the request party is legal or not.If yes,build the session keys for them.While in many applications,the real identity is transmitted in plain text,which has led to the user real identity leakage,and only the legal user can get the session key which is given by the system.This mechanism is not perfect because the cost of key distribution and management is too high.The most common solution to avoid real identity information leakage is anonymous authentication.In many traditional anonymous authentication schemes,the session key generated in the registration phase is maintenance by the system,which cost a lot.Fortunately,the emergence of chaos gives a good solution for the high cost.In the chaotic system,the communication party only need to calculate part of the temporary session key.When get the other,he or she can calculate the full temporary session key according to the semigroup property of Chebyshev chaotic maps.Main work of this thesis is:1.An efficient chaotic map-based authentication scheme with mutual anonymity is proposed in this thesis: In many anonymous authentication schemes,the problem that a communication entity will leak the identity information of the opposite authentication entity does not take into account.In this new proposed scheme,the anonymous identity information of all the communication entities is authenticated by the trusted three part.In this way,the two party communication entities can get nothing about the other which can achieve strong anonymity authentication.At the same time,the semigroup property of the chaotic maps is used to simplify the key distribution and management.Finally,through security analysis and experiment it illustrates the safety and feasibility of this scheme.2.A privacy-preserving roaming authentication scheme for ubiquitous networks is proposed in this thesis: when a mobile terminal locates in the range of the home network provider,it is worth ensuring the truthfulness of real identity of foreign agent,protecting the mobile terminal's privacy and simplifying the key distribution and management.In this scheme,in order to protect communication security of smart terminals,a home agent is used to authenticate the anonymous of the mobile terminal and the real identity of the foreign agent.Meanwhile,the semigroup property of Chebyshev chaotic maps is used to build the temporary session key,which can simplify the key distribution and management.Finally,through security analysis and experiment it illustrates the safety and feasibility of this scheme.
Keywords/Search Tags:Chaotic map, Identity authentication, Privacy protection, Key agreement
PDF Full Text Request
Related items