Authentication and key agreement method capable of resisting leakage of password

A technology of key agreement and password, which is applied in the field of information security and can solve problems affecting the efficiency of the protocol

Active Publication Date: 2019-02-22
HUBEI UNIV OF TECH
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the use of these algorithms will serio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and key agreement method capable of resisting leakage of password
  • Authentication and key agreement method capable of resisting leakage of password
  • Authentication and key agreement method capable of resisting leakage of password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit the invention.

[0073] please see figure 1 , a kind of anti-password leakage authentication and key agreement method provided by the present invention, comprises the following steps:

[0074] Step 1: Initialization, the server generates public parameters, private key and public key;

[0075] The specific implementation includes the following sub-steps:

[0076] Step 1.1: The server S chooses a random large prime number p, chooses one with g 1 is the multiplicative group of generators The order of the group is q, and the above data are disclosed;

[0077] Step 1.2: Selec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication and key agreement method capable of resisting leakage of a password. The method comprises six parts: a system initialization stage, a user registration stage,a user login stage, a user authentication stage, a password changing stage and a key changing stage. The method provided by the invention helps the user to efficiently authenticate with the server and negotiate the session key, effectively resists the attack of the side channel, and is very high in practicability.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an authentication and key negotiation method against password leakage, in particular to the characteristics of user password use, the need for user privacy protection, the need for resisting side channel attacks, and the limitation of method efficiency. An anti-password leakage authentication and key agreement method based on the password splitting method. Background technique [0002] With the development of computers, mobile devices and Internet technology, people are increasingly communicating with others through the Internet. Before communication, there is a step that cannot be ignored is authentication. Communication without authentication loses its practical significance. Most types of authentication today are implemented through the use of authenticating usernames and passwords. The password is usually easy to remember and can be used conveniently. In everyd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/08H04L9/06H04L9/32H04L29/06
CPCH04L9/002H04L9/0643H04L9/0822H04L9/0869H04L9/0891H04L9/0897H04L9/3236H04L63/061H04L63/0869
Inventor 张媛媛张明武
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products