(3.238.235.155) 您好!臺灣時間:2021/05/16 15:56
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:林廷諭
研究生(外文):Ting-yu Lin
論文名稱:一個使用生物特徵智慧卡之 安全低通訊風險遠端使用者認證系統
論文名稱(外文):A secure low communication risk biometric-based remote user authentication scheme using smart cards
指導教授:林宗宏林宗宏引用關係
指導教授(外文):Tsung-Hung Lin
學位類別:碩士
校院名稱:國立勤益科技大學
系所名稱:資訊工程系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:英文
論文頁數:32
中文關鍵詞:資訊藏匿生物特徵密碼學認證智慧卡
外文關鍵詞:Steganographybiometricscryptographyauthenticationsmart card
相關次數:
  • 被引用被引用:0
  • 點閱點閱:407
  • 評分評分:
  • 下載下載:30
  • 收藏至我的研究室書目清單書目收藏:0
越來越多的個人訊息透過雲端網路在客戶端以及伺服
器端之間傳遞。 只靠唯一的密碼來保護,這個驗證的安全
性是不足的,簡單的密碼容易被猜測及破解,而且並沒有身
分確認的特性。前者有相關研究使用機密金鑰來使得密碼的
複雜度提高,後者則是利用生物系統的辨識性來改善。生物
系統是一種特徵辨識系統,可以建立或確認一個人的身分,
而智慧卡擁有卡運算系統(COS)、計算能力以及記憶體,所
以它非常適合儲存加密金鑰來驗證以及運算個人訊息。在本
論文中,我們提出了一個智慧卡認證通訊協定。我們的方法
主要利用一種模餘數運算的特性,來進行兩層的密碼認證,
第一層可以過濾大部分的密碼輸入錯誤,第二層可以確認密
碼的正確性。利用此種雙重密碼認證,可以有效的抵抗字典
攻擊,也可以驗證惡意的密碼攻擊,而不會損失任何的安全
性。經過分析以及比較其它協議後,我們證明我們的方法更
加的安全而且擁有更低的通訊攻擊風險。
More and more personal information is delivered between client and server through cloud networks. The security of authentication is not enough if relying on only passwords. Simple passwords are easy to guess or crack, and it can't check the user's legitimacy. The related research uses secret keys and the biometric system to improve this
scheme. Smart card possesses COS (Card Operating System), computing ability, and memory, so it was very suitable for storing encrypted key to verify personal information.
In this thesis, we propose a smart card communication protocol for authentications. The authentication used the modular arithmetic operator to build multiple authentication. The first authentication can filter most error passwords and the second authentication can check the correctness of the password. This scheme mainly can effectively resist dictionary attacks and also verify malicious password attacks without loss any security.
After the analytic comparison of this protocols with other protocols, the method is more security and prossesses low communication attack risk.
1 Introduction 1
2 Backgrounds and related works 3
3 The proposed scheme 6
3.1 Preparation phase 6
3.2 Login phase 10
3.3 Authentication phase 13
3.4 Password changing phase 18
4 Security analysis and comparisons 26
4.1 Security analysis of the proposed method 26
4.1.1 Messages were stole during communication 26
4.1.2 Resisting replay attacks 26
4.1.3 Resisting masquerade attacks 27
4.1.4 Resisting parallel session attacks 27
4.1.5 Resisting smart-card-theft attacks 27
4.1.6 Resisting password guessing attacks 27
4.2 Performance comparisons 28
5 Conclusion 30
[1] A.K. Das. "Analysis and improvement on an effcient biometric-based remote user authentication scheme using smart cards". Information Security, IET, 5:145{151.

[2] Lei Fan, J.H. Li, and H.W. Zhu. "An enhancement of timestamp-based password authentication scheme". Computers and Security, 21:7:665{667, Nov. 2002.

[3] B.T. Hsieh, H.Y. Yeh, H.M. Sun, and C.T. Lin. "Cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards". In Proceedings of 37th IEEE conference on security technology, pages 349{350, 14-16 Oct. 2003.

[4] M.S. Hwang and C.Y. Liu. "Authenticated encryption schemes: current status and key issues". International Journal of Network Security, pages 61{73, Feb. 2005.

[5] A.K. Jain, A. Ross, and S. Prabhakar. "An introduction to biometric recognition".IEEE Transactions on Circuits and Systems for Video Technology, pages 4{20, Jan.2003.

[6] M.K. Khan and J. Zhang. "Improving the security of a fiexible biometrics remote user authentication scheme". Computer Standards and Interfaces, 29:82-85, Jan. 2007.

[7] M.K. Khan, J. Zhang, and X. Wang. "Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices". Chaotic Solitons Fractals, 35:519-524,
Feb. 2008. 31

[8] L. Lamport. "Password authentication with insecure communication". Communications of the ACM, 24:1:770{772, Nov. 1981.

[9] J.K. Lee, S.R. Ryu, and K.Y. Yoo. "Fingerprint-based remote user authentication scheme using smart cards". Electronic Letters, 38:554-5, Dec. 2002.

[10] N.Y. Lee and Y.C. Chiu. "Improved remote authentication scheme with smart card". Computer Standards and Interfaces, pages 177{180, Feb. 2005.

[11] C.T. Li and M.S. Hwang. "An efficient biometrics-based remote user authentication
scheme using smart cards". Journal of Network and Computer Applications, 33:1:1{5,
Feb. 2010.

[12] C.H. Lin and Y.Y. Lai. "A fiexible biometrics remote user authentication scheme". Computer Standards and Interfaces, 1:19-23, Jan. 2004.

[13] D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar. "Handbook of fingerprint recognition". IEEE Secur. Privacy Mag, 2nd edition, Springer, New York, 2009.

[14] S. Prabhakar, S. Pankanti, and A.K. Jain. "Biometric recognition: security and privacy concerns". IEEE Security and Privacy Magazine, pages 33{42, Feb. 2003.

[15] J.J. Shen, C.W. Lin, and M.S. Hwang. "Security enhancement for the timestamp-based
password authentication using smart cards". Computers and Security, pages 591{595,
Jul. 2003.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top