Method for realizing three-factor anonymous identity authentication based on SM2 algorithm

An identity authentication and three-factor technology, applied in the field of network information security, can solve problems such as offline dictionary attacks, user behavior sensitive information leakage, etc., and achieve the effect of solving sensitive information leakage

Active Publication Date: 2021-10-08
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] On the other hand, if the result of each encryption of the same data is the same, such as using a symmetric cryptographic algorithm to encrypt data and the encryption key and data are the same in each encryption, the attacker can still pass the same encryption result between sessions Tracking users, leading to leakage of sensitive information such as user behavior
[0006] (2) Offline dictionary attack
[0009] Cryptographic operations are the core of identity authentication security, and the defects of cryptographic algorithms will cause security risks. For example, the inherent defects of the Chebyshev chaotic map can be used to recover the message from the given ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing three-factor anonymous identity authentication based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0048] This SM2 algorithm of the present invention realizes the method for three-factor anonymous identity authentication, which comprises the following steps:

[0049] (1) System initialization, the server generates a private key d and a public key P, keeps the private key d secret, and releases the public key P;

[0050] (2) User registration;

[0051] (3) User offline pre-authentication;

[0052] (4) Online two-way authentication and key agreement;

[0053] (5) User password update.

[0054] As a preferred embodiment of the present invention, described step (2) specifically includes the following steps:

[0055] (2.1) The user terminal collects the user's self-selected identification ID, password PW and biometric feature B;

[0056] (2.2) Fuzzy extraction is carried out to the biometric feature of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for achieving three-factor anonymous identity authentication based on an SM2 algorithm. The method comprises the steps: system initialization: a server generates a private key d and a public key P, the private key d is kept secret, and the public key P is published to the outside; user registration; user offline pre-authentication; online bidirectional authentication and key negotiation; and updating of the user password. According to the method for realizing three-factor anonymous identity authentication based on the SM2 algorithm, mutual authentication and key negotiation security are realized by utilizing multiple means, so the problems of sensitive information leakage, offline dictionary attack, insufficient security strength of a cryptographic algorithm and the like in the prior art are solved.

Description

technical field [0001] The invention relates to the field of network information security, in particular to the field of SM2 algorithm, and specifically refers to a method for realizing three-factor anonymous identity authentication based on the SM2 algorithm. Background technique [0002] In order to ensure the communication security between the user client and the background server, identity authentication is an essential security measure. The current authentication scheme has the following problems. [0003] (1) Sensitive information protection [0004] The three-factor identity authentication formed by the combination of user ID password, user equipment, and biometrics can provide richer security attributes. However, if the user self-selected identification, password and biometrics are not properly transmitted or stored, such as plain text transmission, storage identification, password and biometrics, etc., it will lead to the leakage of sensitive information. It shoul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/46G06F21/60
CPCG06F21/44G06F21/46G06F21/602
Inventor 戴聪
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products