[1]黄俊 王行恒.基于Diffie—Hellman算法的身份认证模型研究[J].计算机技术与发展,2011,(05):143-146.
 HUANG Jun,WANG Xing-heng.Diffie-Hellman Algorithm-Based Identity Authentication Model Research[J].,2011,(05):143-146.
点击复制

基于Diffie—Hellman算法的身份认证模型研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年05期
页码:
143-146
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Diffie-Hellman Algorithm-Based Identity Authentication Model Research
文章编号:
1673-629X(2011)05-0143-04
作者:
黄俊1 王行恒2
[1]公安部第三研究所信息网络安全公安部重点实验室[2]华东师范大学计算中心
Author(s):
HUANG Jun WANG Xing-heng
[1]Ministry of Public Security Key Laboratory of Information Network Security[2]Computer Center ,East China Normal University
关键词:
Diffie-Hellman算法身份认证消息认证码信息安全信息交换
Keywords:
Diffie-Hellman algorithm identity authentication MAC information security information exchange
分类号:
TP393
文献标志码:
A
摘要:
随着Web应用的安全问题的突出,Web应用系统的身份认证越来越重要,一种通用的安全的身份认证模型的建立很有必要。提出了一种安全的、可互操作的、实用的身份认汪模型,它基于Diffie-Hellman密钏交换算法,在认证的过程中刖共享密钥加密防窃听,用随机数防重放攻击,用消息认证码防篡改,保证了应用服务器与认证服务器之间的通信安全。文章详细阐述了模型设计细节,通过对其安全性进行分析,认为该模型具有较高安全性,并计划将该模型用于公安eID系统中
Abstract:
As the security problems of the Web applications become more prominent, Web application authentication systems are more and more important, and it is necessary to build an available and security identity authentication model. Present a'kind of safe, interoperable, practical identity authentication model, which is based on Diffie-Hellman key exchange algorithm. The model uses sharing encryp- tion to prevent eavesdropping, uses random against replay attack, and uses MAC against tampering, which ensure the communication se- curity between the application server and the authentication server. Also expound the details of the model design and analyzes its safety Finally, believe that the model is of high security, and plan to use it in the eID system

相似文献/References:

[1]田志英 廖晓群 赵安新.校园网认证计费系统的研究与实现[J].计算机技术与发展,2010,(05):202.
 TIAN Zhi-ying,LIAO Xiao-qun,ZHAO An-xin.Research and Implementation of Campus Network Authentication and Accounting System[J].,2010,(05):202.
[2]万久士 李翔 林祥.基于JSSh实现身份认证网站信息采集[J].计算机技术与发展,2009,(10):156.
 WAN Jiu-shi,LI Xiang,LIN Xiang.Information Collection of Website which Achieve Identity Authentication Based on JSSh[J].,2009,(05):156.
[3]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(05):181.
[4]吕武玲 黎忠文.SIP中基于身份认证的安全机制研究[J].计算机技术与发展,2009,(02):158.
 LU Wu-ling,LI Zhong-wen.Research on Identity- Based Authentication in SIP[J].,2009,(05):158.
[5]孙印杰 陈智芳 王敏 洪力.基于指纹和数字水印的网络身份认证系统研究[J].计算机技术与发展,2008,(04):147.
 SUN Yin-jie,CHEN Zhi-fang,WANG Min,et al.Research of Authentication System Based on Fingerprint and Digital Watermarking[J].,2008,(05):147.
[6]黄叶珏 陈勤.Web网站统一口令认证系统的设计与实现[J].计算机技术与发展,2007,(06):163.
 HUANG Ye-jue,CHEN Qin.Design and Implementation of Web Site Universal Password Authentication System[J].,2007,(05):163.
[7]徐小平 尹颖禹.基于数字签名的身份认证模型的一种方案[J].计算机技术与发展,2006,(02):220.
 XU Xiao-ping,YIN Ying-yu.A Model Scheme for Identity Verification Based on Digital Signature[J].,2006,(05):220.
[8]范宏生 叶震 侯保花.基于公钥密码体制的Kerberos协议的改进[J].计算机技术与发展,2006,(04):224.
 FAN Hong-sheng,YE Zhen,HOU Bao-hua.Improvement of Kerberos Protocol Based on Public Key Cryptosystem[J].,2006,(05):224.
[9]刘建明 贺占庄.硬盘加密和身份认证的硬件实现[J].计算机技术与发展,2006,(06):139.
 LIU Jian-ming,HE Zhan-zhuang.A Hardware Design of Harddisk Encryption and Identification[J].,2006,(05):139.
[10]张球河 李也白 王宇鸽 尹天明.电子政务资源安全管理的研究与应用[J].计算机技术与发展,2006,(09):222.
 ZHANG Qiu-he,LI Ye-bai,WANG Yu-ge,et al.Research and Application of E- Government Resource Security Management[J].,2006,(05):222.

备注/Memo

备注/Memo:
国家863计划(2008AA01E412);发改办高技([2008]1736号)黄俊(1981-),男,江西吉安人,研究实习员,硕士,研究方向为信息网络安全;王行恒.副教授,研究方向为计算机应用技术
更新日期/Last Update: 1900-01-01