作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (20): 81-84. doi: 10.3969/j.issn.1000-3428.2012.20.021

• 安全技术 • 上一篇    下一篇

基于D-H密钥交换协议的用户认证方案

周先存 1,2,熊 焰 2,刘仁金 1   

  1. (1. 皖西学院信息工程学院,安徽 六安 237012;2. 中国科学技术大学计算机科学与技术学院,合肥 230027)
  • 收稿日期:2011-11-02 修回日期:2012-02-19 出版日期:2012-10-20 发布日期:2012-10-17
  • 作者简介:周先存(1974-),女,副教授,主研方向:信息安全;熊 焰、刘仁金,教授、博士
  • 基金资助:
    国家自然科学基金资助项目(61170233);安徽省自然科学基金资助项目(11040606M150);安徽省高等学校省级自然科学研究基金资助项目(KJ2011B204)

User Authentication Scheme Based on D-H Key Exchange Protocol

ZHOU Xian-cun 1,2, XIONG Yan 2, LIU Ren-jin 1   

  1. (1. School of Information Engineering, West Anhui University, Lu’an 237012, China; 2. School of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, China)
  • Received:2011-11-02 Revised:2012-02-19 Online:2012-10-20 Published:2012-10-17

摘要: 分析指出Liaw等人的远程用户认证方案(Mathematical and Computer Modelling, 2006, No. 1/2)容易受到重放攻击和中间人攻击,并且密码修改阶段和注册阶段存在安全漏洞,在此基础上提出一个基于D-H密钥交换协议的远程用户认证方案。理论分析结果表明,该方案可以抵抗假冒攻击、重放攻击、中间人攻击,安全地实现相互认证及会话密钥生成。

关键词: 用户认证, D-H密钥交换协议, 智能卡, 会话密钥, 哈希函数, 中间人攻击

Abstract: Analysis indicates that Liaw et al’s remote user authentication scheme is vulnerable to replay attack, man-in-the-middle attack, and there are obvious security vulnerabilities in the password changing phase and registration phase. A remote user authentication scheme based on Diffie-Hellman(D-H) key exchange protocol is proposed. Theoretical analysis shows that the scheme can resist impersonation attack, replay attack, man-in-the-middle attack, and it can implement mutual authentication and session key generation securely.

Key words: user authentication, Diffie-Hellman(D-H) key exchange protocol, smart card, session key, hash function, man-in-the-middle attack

中图分类号: