Font Size: a A A

Research On Key Technologies Of Web Authentication Protocol Supporting Key Update

Posted on:2019-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:Z X ChenFull Text:PDF
GTID:2518306473453974Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the wide application of the Internet,people enjoy the convenience brought by network communications and at the same time,they are exposed to the risk of leakage of communication information caused by various cyber attacks.In order to ensure the safety of network communication,a large number of Web authentication protocols have been proposed and applied.However,with the continuous increase in the means of attack,especially the emergence of Man-In-The-Middle(MITM)attacks,new challenges have been posed to the existing Web authentication protocols.It is of great significance to study attack methods of attackers,discover the security vulnerabilities of Web authentication protocols,enhance protocols' security and design new Web authentication protocols.This paper starts with the authentication methods of existing Web authentication protocols,and studies the status quo and development trend of Web authentication technologies.This paper studies Web authentication technology based on TLS protocol from four aspects:the authentication method of Web authentication protocols,the MIMT attack existing in the protocols,the security of the protocols and the efficiency of the protocols.The main contribution of the paper has the following three points: First of all,this paper analyzes several existing Web authentication protocols,including the Web authentication protocols based on strong certificate authentication or based on enhanced client authentication and server authentication.We have studied the MITM attacks existing in these protocols and summarized the loopholes in these protocols.Secondly,we designed the MAC value verification operation to achieve the process of mutual authentication between the client and the server in the process of Web authentication,which prevented the middleman from attacking by embedding malicious code.Design a reasonable authentication key update and storage,making the Web authentication protocol to support the key update function.In the authentication process,the server can update and store the key in real time under the condition of consuming less storage space,reducing the risk of key leakage caused by the repeated use of the same key and enhancing the security of authentication.We prove the security conclusions of the Web authentication protocol through the proof of security.A reasonable static resource cache loading scheme is designed so that the Web authentication protocol can reduce the process of verifying the cache file while loading the static resource cache so as to improve the execution efficiency of the protocol.Finally,we use the existing experimental environment,respectively,to achieve the existing Web authentication protocol and our proposed program.Through experiments,we demonstrate the performance of the proposed scheme when loading static resource caches and performing key update respectively,and demonstrate the improvement of the proposed scheme by comparing with the existing Web authentication protocol.
Keywords/Search Tags:TLS, Man-In-The-Middle(MITM) Attack, Channel ID, Web Authentication, Key Update
PDF Full Text Request
Related items