Lightweight identity authentication key negotiation method for resource-constrained terminal

A technology of identity authentication and key agreement, applied in the field of information security, can solve problems such as key leakage, smart card loss, and weak resource-limited terminals, etc., achieve small system parameters and storage space, fast computing speed, and avoid malicious attacks Effect

Active Publication Date: 2021-10-29
GUILIN UNIV OF ELECTRONIC TECH +1
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for resource-constrained terminals, some original authentication schemes have certain limitations.
On the one hand, the high computational complexity is not conducive to resource-constrained terminals with weak computing capabilities
On the other hand, most of the original solutions have one or more vulnerability attacks such as smart card loss attack, offline dictionary attack, key disclosure attack, and lack of forward security, which is not conducive to resource-constrained terminals with high security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight identity authentication key negotiation method for resource-constrained terminal
  • Lightweight identity authentication key negotiation method for resource-constrained terminal
  • Lightweight identity authentication key negotiation method for resource-constrained terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] The invention relates to a lightweight identity authentication key negotiation method for resource-limited terminals. This method has four phases: registration phase, login and authentication phase, password modification phase, smart card revocation phase (such as figure 1 shown). In the scheme, set server S j The counter CTR_S of the user and the counter CTR_SC of the user are used to track the consecutive failed attempts of login and authentication. The initial value is set to 0, and the maximum failure threshold is set to n. When CTR_S>n or CTR_SC>n, the communication process is terminated immediately. The symbols and explanations used in the present invention are shown in the following table:

[0034]

[0035]

[0036] The four stages of this method are described in detail as follows:

[0037] Phase A: Registration phase (eg figure 2 shown)

[0038] In the registration stage, smart cards are mainly issued to users, so that legal users have legal identit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight identity authentication key agreement protocol for a resource-constrained terminal. According to the method, a set of identity authentication and session key agreement service is provided between a resource-constrained terminal and a server. The method can ensure that the identities of the resource-limited terminal and the server are real and effective, and malicious attacks are avoided. The scheme comprises four stages: a registration stage, a login and authentication stage, a password modification stage and an intelligent card revocation stage. According to the method, an elliptic curve algorithm is introduced to encrypt key data in a login authentication process. A one-way Hash algorithm is introduced in the protocol design process, the risk of data plaintext transmission leakage is avoided on the basis that the intelligent card and password double factors serve as important links of identity authentication, and security vulnerabilities such as intelligent card loss attacks and offline dictionary attacks are resisted. Compared with other key negotiation protocols, the protocol is small in key size, system parameters and storage space, high in operation speed and suitable for terminal equipment with limited computing resources and storage resources.

Description

technical field [0001] The invention relates to the field of information security, in particular to a lightweight identity authentication key negotiation method for resource-limited terminals. Background technique [0002] With the rapid development of IoT technology, the number of resource-constrained terminal devices has increased dramatically, such as smart watches, TVs, wearable devices, home security systems, driverless cars, and robots, which use and generate data all the time. exponential growth. Resource-constrained terminal devices have many limitations. On the one hand, compared with servers or computers, resource-constrained terminals have limitations in storage capacity, computing power, battery power, etc., and resource-constrained terminals are more mobile and hierarchical. It is complex, and multiple security domains coexist, so it is not suitable to deploy the original identity authentication key agreement protocol with high consumption to ensure secure comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/0876H04L63/083H04L63/0853H04L63/1433H04L63/1458H04L9/0838H04L9/0869H04L9/3297H04L9/3252Y02D30/70
Inventor 何倩宋静石荣江炳城黄少伟董庆贺翟仲毅喻军郭标
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products