J4

• 计算机科学 • 上一篇    下一篇

基于混沌理论的身份认证方案

姜楠1,2, 杨德礼1, 王德高2   

  1. 1. 大连理工大学 系统工程研究所, 辽宁 大连 116024; 2. 大连民族学院 计算机科学与工程学院, 辽宁 大连 116600
  • 收稿日期:2007-12-03 修回日期:1900-01-01 出版日期:2008-07-26 发布日期:2008-07-26
  • 通讯作者: 杨德礼

Identity Authentication Scheme Based on Chaotic Theory

JIANG Nan1,2, YANG Deli1, WANG Degao2   

  1. 1. Institute of Systems Engineering, Dalian University of Technology, Dalian 116024, Liaoning Province, China;2. School of Computer Science and Engineering, Dalian Nationality University, Dalian 116600, Liaoning Province, China
  • Received:2007-12-03 Revised:1900-01-01 Online:2008-07-26 Published:2008-07-26
  • Contact: YANG Deli

摘要: 基于混沌理论和一次性口令认证技术, 提出一种可以抵御常见攻击的身份认证方案. 解决了常规一次性口令认证方案不能抵御小数攻击、 明文传送迭代次数不安全以及传统Hash函数存在易于找到碰撞安全漏洞的问题, 该方案用混乱和散布性质好、 抗碰撞能力强的混沌Hash函数代替传统的Hash函数, 用混沌置乱排序算法产生的迭代次数代替网上明文传输的迭代次数, 具有较高的安全性.

关键词: 份认证, 混沌Hash函数, 一次性口令

Abstract: Based on chaotic theory combined with one time password authentication technology, an identity authentication scheme was presented which can resist attacks in common and resolve ordinary one time password unresisting small number attack and insecurity problems of transmitting plaintext iteration times and easily finding the security leak of collisions in traditional Hash function. In this scheme, traditional Hash function was substituted with chaotic Hash function of more safety about confusion and diffusion, stranger resistant collision ability, and plaintext iteration times was substituted with scramble sort algorithm generated iteration times in network, so it is more safety.

Key words: identity authentication, chaotic Hash function, one time password

中图分类号: 

  • TP309