Font Size: a A A

Research On Authentication Scheme Based On Elliptic Curve Cryptography

Posted on:2020-06-04Degree:MasterType:Thesis
Country:ChinaCandidate:X D LiuFull Text:PDF
GTID:2518305972467334Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of Communication technology and network technology,The wide application of information networks not only brings great convenience to people's lives,but also becomes an important symbol of national progress and development.Therefore,secure communication has become the hottest topic in the computer science community.The security authentication protocol based on cryptography can make sure the communication security when people send messages in public channel.So,many experts and scholars have been deeply involved in this field.This paper mainly studies the identity authentication protocols based on elliptic curve cryptography.After briefly reviewing a lightweight authentication protocol under the smart grid proposed by Mahmood et al.and an anonymous roaming service agreement for users under the global mobile network proposed by Marimuthu et al.I pointed out that there are some security holes in their protocol.Further,we propose two improved authentication protocol schemes,and make full use of the three mathematical problems of elliptic curves.The proposed scheme is verified by Burrows-Abadi-Needham(BAN)logic.Finally,through the comparison of security and efficiency analysis,it is confirmed that the improved protocol is more secure and practical.The main contents of this paper are arranged as following:In Chapter 1,I expound the research background and research status of the thesis and give a brief description of the structure of the paper;In Chapter 2,I introduce the basic knowledge of cryptography required by the thesis including identification protocol,zero-knowledge proof,algebra basis,elliptic curve cryptography,safety proof and so on.In Chapter 3,I review the protocol proposed by Mahmood et al.and make a security analysis of the protocol.In Chapter 4,I review the protocol proposed by Marimuthu et al.and make a security analysis of the protocol.In Chapter 5,I present an improved protocol based on the protocol of Mahmood et al.and detail the protocol and proves its security with the BAN protocol.In Chapter 6,I present an improved protocol based on the protocol of Marimuthu et al.and detail the protocol and proves its security with the BAN protocol.In Chapter 7,we summarize the article.
Keywords/Search Tags:smart grid, authentication, key agreement, elliptic curve cryptography, global mobile network, BAN logic
PDF Full Text Request
Related items