A Remote Authentication Protocol Method Based on Password

A technology of remote authentication and protocol, applied in the field of password-based remote authentication protocol, it can solve problems such as hidden dangers, unstoppable favor, small data volume, etc., and achieve the effect of resisting replay attacks

Active Publication Date: 2017-02-22
HARBIN ENG UNIV
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although password-based authentication has the security risks mentioned above, this does not prevent people from favoring it, because compared with biometric authentication, password authentication mechanism has the advantages of smaller data volume and faster response speed. , and it is easier to implement, and most users can accept it, so the password authentication mechanism is still the main authentication method used in various systems that require authentication, such as system networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Remote Authentication Protocol Method Based on Password
  • A Remote Authentication Protocol Method Based on Password
  • A Remote Authentication Protocol Method Based on Password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention is realized based on the elliptic curve cryptographic algorithm. In the system initialization sub-protocol, the user negotiates with the server the parameters of the elliptic curve cryptographic system that need to be used for authentication;

[0038] (1) User registration sub-agreement:

[0039] At the time of initial registration, by user U A Choose your own identity and user password PW A , and then submitted to the server S in a secure manner;

[0040] Server S receives new user U A The ID submitted by the registration A and user password PW A ; later, calculate Then put the data (ID A ,W A ) is saved in the authentication database of the server, in the above formula, d S Indicates the private key of the server, and h indicates the one-way hash function.

[0041] (2) Authentication and key agreement sub-protocol:

[0042] 1) User U A First enter your ID A and user password PW A ; The user freely chooses a random number r 1 ,r 1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a remote protocol authentication method based on passwords. The method is characterized in that the method is achieved on the basis of the elliptic curve cryptographic algorithm, and the method includes the following steps that 1, in a system initialization sub-protocol, a user and a server negotiate elliptic curve cryptosystem parameters which need to be used in subsequent authentication; 2, a new user UA performs registration through a user registration sub-protocol and selects an identity label and a user password PWA; 3, when the user UA wants to login a system to perform session key negotiation, firstly the user UA inputs the identity label IDA and the user password PWA, then double-way authentication is conducted between the user UA and the server and secret keys used in subsequent communication are negotiated through identity authentication and a key negotiation sub-protocol.

Description

technical field [0001] The invention relates to a password-based remote authentication protocol method. Background technique [0002] In network applications, identity authentication plays an important role in ensuring the security of network resources, so finding a simple, effective, practical, convenient, and low-cost authentication protocol is the focus of current research. Password-based identity authentication protocol has become a research hotspot in recent years because of its simple data calculation, low deployment cost, security and reliability. However, password-based identity authentication protocols still have security risks. Because users habitually choose to use simple and easy-to-remember character strings as passwords, such as their own initials, combinations of birthday numbers, combinations of ID numbers, email and phone numbers, etc., which will directly lead to this type of identity authentication protocol Vulnerable to typical dictionary attacks, inclu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 马春光付韬崔振山苗俊峰
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products