Dissertation > Excellent graduate degree dissertation topics show

Research and Implementation of Dynamic Password Authentication Scheme Based on Ecc

Author: LiTianQing
Tutor: LiuJianHui
School: Liaoning Technical University
Course: Applied Computer Technology
Keywords: Elliptic Curve Dynamic password Hash function Authentication
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 74
Quote: 0
Read: Download Dissertation

Abstract


With computers and the rapid development of network technology , people's lives undergoing tremendous changes , the network started to become a part of people's lives , plays an increasingly important role. The development of electronic commerce is to maximize the role of the network , but the network at the same time there were a lot of illegal activities , how to ensure network and information security is every person , every business and every country must face . Authentication information security as the first threshold , the protection of system security to play a huge role irreplaceable , if authentication system compromised by an attacker , the entire system will be no security to speak of , so all other security services is built on the basis of identity , so the only authentication security is essential . The traditional authentication schemes generally use static password authentication method , which is simple to use, but because of its security flaws, the authentication does not provide adequate security. Dynamic password authentication technology is static passwords for security flaws in the proposed . The basic idea is to join in the certification process uncertain factors ( such as time, a random number ) as a challenge to achieve each pass passwords are not the same , in order to provide security. This paper analyzes the various authentication technologies today , in the analysis of the classical certification scheme, is proposed based on elliptic curve cryptosystem dynamic password authentication scheme that order elliptic curve cryptosystem as the core algorithm, compared with the previous human ElGamal encryption algorithm has a higher security, and the key length of the growth rate is small. The program addresses the legacy of previous programs server forgery attack the problem of random numbers used in the program as uncertainty , making the scheme can resist replay attacks , and implementation of the server and client mutual authentication , combined with smart card and fingerprint identified to further improve the security of the authentication scheme , and in the authentication key can then negotiate a subsequent communication security protection .

Related Dissertations

  1. Research on Transparent Security of JPEG Image,TP391.41
  2. The Design of Computer Forensics Model Based on Windows Log,D918.2
  3. Study on Legal Issues in Concluding Electronic Commerce Contract,D923
  4. Image Restoration Method Research and Its Application Based on Probability PCA,TP391.41
  5. Research and Application on Security Authentication Technologies in Internet of Things,TN929.5
  6. Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor,TN918.1
  7. Design and Development of Accident Management Information System for Large-scale Hydropower Projects,TP311.52
  8. Research on the Low-cost RFID Systems Security Protocol,TP391.44
  9. Design of AHB Monitor Based on SHA and AES Algorithms,TP309.7
  10. Research and Implementation of Embeded Web System Security,TP393.08
  11. VoIP Security Mechamism Research and Implementation Based on the Mobile Network,TN916.2
  12. Design and Implementation of Authentication Mechanism in Object-based Storage System,TP333
  13. A Video Copyright Registration and Identification System Based on Copy Detection,TP311.52
  14. RFID Authentication Protocol Based on Hash Function,TP391.44
  15. Research on Secure and Trusted Video Sensor Node,TN929.5
  16. Design and Implement of Frequency EOC System and Research of Its Security Mechanism,TN915.02
  17. Security and Privacy Protection of Mobile RFID Conforming to EPCC1GEN2,TP391.44
  18. Research of the Security Authentication Protocol for RFID Systems,TP391.44
  19. A Secure Application Layer Multicast Group Member Management Model,TP393.08
  20. The Research of Hubei Medical Card Mode and Information Platform,R197.1
  21. Identity-Based Authentication System Research and Implementation,TN918.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile