A dynamic password authentication method against man-in-the-middle attacks

A technology of dynamic password and authentication method, applied in the field of information security, can solve the problems of unable to achieve two-way authentication, unable to resist password guessing attacks or man-in-the-middle attacks, and achieve the effect of solving fake server attacks, improving authentication efficiency, and resisting brute force attacks.

Active Publication Date: 2022-07-29
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a dynamic password authentication method against man-in-the-middle attacks. The main problem to be solved by the present invention is: the current design of dynamic password authentication protocols either cannot resist password guessing attacks or man-in-the-middle attacks, or cannot realize two-way Certification, and poor convenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dynamic password authentication method against man-in-the-middle attacks
  • A dynamic password authentication method against man-in-the-middle attacks
  • A dynamic password authentication method against man-in-the-middle attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Example 1, see Figure 1 to Figure 4 In order to solve the problems of security and convenience of password authentication technology, this embodiment proposes a new design of a smart card-based dynamic password authentication protocol. This embodiment utilizes the difficulty of RSA and smart card technology to improve authentication efficiency.

[0074] For a clearer and more concise description, the concept of user Alice is introduced in this embodiment. The user Alice refers to the user Alice himself, and also refers to the mobile terminal or fixed terminal of the user Alice. The mobile terminal may be a smart phone, tablet, or handheld computer. , the fixed terminal may be a desktop computer, etc. In this embodiment, the two are regarded as the same executive body.

[0075] A dynamic password authentication method against man-in-the-middle attack, comprising: a registration stage and a login stage;

[0076] see figure 1 and figure 2 , the registration phase incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic password authentication method against man-in-the-middle attack, which mainly includes a registration phase and a login phase. The design of the invention is based on the difficult problem of RSA, and can effectively resist man-in-the-middle attacks and offline password guessing attacks. Compared with the existing password The authentication scheme of the present invention: in the authentication process, the number of times of encryption and decryption operations performed by the user and the server is reduced, and the authentication efficiency is improved; The process is more secure; it can effectively resist brute force attacks and man-in-the-middle attacks on passwords, and at the same time, two-way authentication is added to solve the problem of fake server attacks.

Description

technical field [0001] The invention relates to the field of information security, in particular to a dynamic password authentication method against man-in-the-middle attacks. Background technique [0002] Since the advent of password authentication technology, it has been widely used in all aspects of our life due to its convenience and relative security. From the login of the website account to the convenient mobile payment, the password can be seen anytime, anywhere. But with the widespread use of authentication technology, it also brings a series of hidden dangers. Due to the limited key space of the password itself, it is vulnerable to online or offline guessing attacks and man-in-the-middle attacks. [0003] One way to solve these security risks is to use one-time password technology, also known as dynamic password technology. The classic dynamic password technology such as S / KEY has the problem of limited number of logins, and the subsequent design of SAS and its u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0825H04L9/0869H04L9/3228H04L9/3234H04L9/3239H04L9/3273H04L63/1466
Inventor 王少辉王平邓志辉王志伟王化群
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products