One-time password authentication method

A password authentication and one-time technology, which is applied in the direction of user identity/authority verification, etc., can solve the problems of difficult one-time encryption, troublesome keys, and inability to obtain ciphertext, etc., to achieve the reduction of computational complexity and the improvement of security performance Effect

Inactive Publication Date: 2009-03-25
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But even if the enemy borrows fire to get the ciphertext, because of the incomprehensibility of discrete logarithm, the ciphertext mi cannot be obtained
The disadva

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-time password authentication method
  • One-time password authentication method
  • One-time password authentication method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0019] The symbols used in the embodiment are shown in the table:

[0020]

[0021] The main steps of the authentication method are as follows:

[0022] A, registration phase (Registration)

[0023] (1) Generate key pair e, d based on RSA algorithm;

[0024] a) The user terminal randomly selects two large prime numbers p and q, calculates n=pq, ¢(n)=(p-1)(q-1), and p, q, ¢(n) are kept secret by the users;

[0025] b) Choose public key e: 1

[0026] c) Seek private key d: make de=1mod ¢(n), d users keep secret;

[0027] Then: any g∈Z n , G is Z n A primitive element of with g ed =g modn is established.

[0028] (2) Generate authentication basis t based on the discrete logarithm problem on the finite field;

[0029] a) The user terminal generates a large prime number u, t ∈ Z u Is a primitive element;

[0030] b) Randomly select one's own secret seed s (1≤s≤u-1), s users keep secret;

[0031] c) Calculate t s mod u, and then send a registration reque...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an encryption and authentication technology and provides a one-off authentication method based on an RSA encryption. The method introduces a uniform random number, has the advantages of a one-off password authentication mechanism, is based on the method of encrypting an asymmetric key of an RSA, has the intractability of a discrete logarithm, can effectively resist replay attack, overcomes the weaknesses of the one-off password authentication mechanism password based on an HASH chain algorithm, and eliminates the need of reinitializing a system at intervals. The technology has the beneficial effects that compared with the one-off password authentication method in the prior art, the safety of the technology is improved, and the complexity of an operation is reduced.

Description

technical field [0001] The invention relates to encryption authentication technology. Background technique [0002] The principle of OTP (One-Time Password) is to add uncertain factors during the login process, so that the passwords are different every time. After the system receives the login password, it can verify the user's identity by performing an operation with the same algorithm. identity. OTP is a digest authentication, which can resist replay attack and external passive attack, and is a feasible, safe and effective authentication scheme. The common one-time password authentication mechanism based on the hash chain algorithm can overcome weaknesses such as replay attacks, because the login password is sent to the server in the form of an irreversible hash function, and the number of hash times of the login password is reduced by 1 for each login. Therefore, it can effectively resist replay attacks. However, hash-based one-time password mechanisms are vulnerable t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 王艳艳刘贤洪康红娟
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products