J4

• 计算机科学 • Previous Articles     Next Articles

Identity Authentication Scheme Based on Chaotic Theory

JIANG Nan1,2, YANG Deli1, WANG Degao2   

  1. 1. Institute of Systems Engineering, Dalian University of Technology, Dalian 116024, Liaoning Province, China;2. School of Computer Science and Engineering, Dalian Nationality University, Dalian 116600, Liaoning Province, China
  • Received:2007-12-03 Revised:1900-01-01 Online:2008-07-26 Published:2008-07-26
  • Contact: YANG Deli

Abstract: Based on chaotic theory combined with one time password authentication technology, an identity authentication scheme was presented which can resist attacks in common and resolve ordinary one time password unresisting small number attack and insecurity problems of transmitting plaintext iteration times and easily finding the security leak of collisions in traditional Hash function. In this scheme, traditional Hash function was substituted with chaotic Hash function of more safety about confusion and diffusion, stranger resistant collision ability, and plaintext iteration times was substituted with scramble sort algorithm generated iteration times in network, so it is more safety.

Key words: identity authentication, chaotic Hash function, one time password

CLC Number: 

  • TP309