Remote protocol authentication method based on passwords

A technology of remote authentication and protocol, applied in the field of password-based remote authentication protocol, it can solve the problems of hidden security risks, small data volume, inability to prevent favor, etc., and achieve the effect of resisting replay attacks

Active Publication Date: 2014-07-02
HARBIN ENG UNIV
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although password-based authentication has the security risks mentioned above, this does not prevent people from favoring it, because compared with biometric authentication, password authentication mechanism has the advantages of smaller data ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote protocol authentication method based on passwords
  • Remote protocol authentication method based on passwords
  • Remote protocol authentication method based on passwords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention is realized based on the elliptic curve cryptographic algorithm. In the system initialization sub-protocol, the user negotiates with the server the parameters of the elliptic curve cryptographic system needed for authentication afterwards;

[0038] (1) User registration sub-agreement:

[0039] At the beginning of registration, user U A Choose your own identity and user password PW A , And then submit it to the server S in a secure way;

[0040] Server S receives new user U A Identity ID submitted by registration A And user password PW A ; After that, calculate W A =h(ID A ||d S )⊕PW A , And then put the data (ID A ,W A ) Is stored in the authentication database of the server, where d S Represents the private key of the server, and h represents a one-way hash function.

[0041] (2) Authentication and key agreement sub-protocol:

[0042] 1) User U A First enter your own identification ID A And user password PW A ; The user freely chooses a random number r 1 ,r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a remote protocol authentication method based on passwords. The method is characterized in that the method is achieved on the basis of the elliptic curve cryptographic algorithm, and the method includes the following steps that 1, in a system initialization sub-protocol, a user and a server negotiate elliptic curve cryptosystem parameters which need to be used in subsequent authentication; 2, a new user UA performs registration through a user registration sub-protocol and selects an identity label and a user password PWA; 3, when the user UA wants to login a system to perform session key negotiation, firstly the user UA inputs the identity label IDA and the user password PWA, then double-way authentication is conducted between the user UA and the server and secret keys used in subsequent communication are negotiated through identity authentication and a key negotiation sub-protocol.

Description

Technical field [0001] The invention relates to a password-based remote authentication protocol method. Background technique [0002] In network applications, identity authentication plays an important role in ensuring the security of network resources. Therefore, finding a simple, effective, practical, convenient, and low-cost authentication protocol is the focus of current research. Password-based identity authentication protocols have become a research hotspot in recent years due to simple data operations, low deployment costs, and safety and reliability. However, the password-based identity authentication protocol still has security risks. Because users are habitually choosing to use simple and easy-to-remember strings as passwords, such as the abbreviation of their name, the combination of birthday numbers, the combination of ID numbers, and the mailbox phone number, which will directly lead to this type of identity authentication protocol It is vulnerable to typical dicti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 马春光付韬崔振山苗俊峰
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products