首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种远程身份认证方案的分析与改进
引用本文:张利华,吕善伟.一种远程身份认证方案的分析与改进[J].北京航空航天大学学报,2005,31(10):1076-1079.
作者姓名:张利华  吕善伟
作者单位:北京航空航天大学,电子信息工程学院,北京,100083;北京航空航天大学,电子信息工程学院,北京,100083
摘    要:口令认证是远程身份认证中实用的方法.分析了一个给出的使用智能卡的口令认证方案的安全性,指出该方案是不安全的:不能抵御并行会话攻击,攻击者可以利用截获的信息生成合法的登陆信息假冒合法用户登陆,并通过认证获得授权,而不需要知道用户口令;不能抵御更改时戳攻击,攻击者可以更改截获信息的时戳,假冒合法用户登陆远程主机或假冒合法远程主机.同时,引入登陆计数器,采用一卡一密,给出了一种改进的使用智能卡的口令认证方案.该方案允许用户自主选择并更改口令,实现了双向认证;能够抵御重放攻击、内部攻击,具备强安全修复性;能够抵御并行会话攻击和更改时戳攻击,具有更好的安全性.

关 键 词:身份认证  口令  安全分析  智能卡
文章编号:1001-5965(2005)10-1076-04
收稿时间:2004-06-09
修稿时间:2004年6月9日

Analysis and improvements of a remote authentication scheme
Zhang Lihua,Lü Shanwei.Analysis and improvements of a remote authentication scheme[J].Journal of Beijing University of Aeronautics and Astronautics,2005,31(10):1076-1079.
Authors:Zhang Lihua  Lü Shanwei
Institution:School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
Abstract:Password authentication scheme is a very promising and practical solution to remote user authentication.The security of a proposed password authentication scheme using smart cards is analyzed.The scheme has some weaknesses: it cannot resist parallel session attack,an intruder without knowing users' password can masquerade as a legal user by creating a valid login message from the eavesdropped communication,then passes the authentication phase and gains the authority of the legitimate user;it is also vulnerable to changing timestamps attack,an intruder can masquerade as a legal user or impersonate a valid authentication system by changing timestamps of the messages from eavesdropped communication.Furthermore,an enhanced password authentication scheme using smart cards with better security strength by using login counter and different keys via cards is proposed.The scheme has many merits as following: it lets users freely choose and change their passwords at their own will;it provides mutual authentication between two entities;it resists message replaying attack and insider attack;it has strong security reparability by using extended identities and smart cards;it also withstands parallel session attack and changing timestamps attack.
Keywords:user authentication  password  cryptanalysis  smart cards
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号