中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Item 987654321/68827
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 80990/80990 (100%)
Visitors : 42729222      Online Users : 1207
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/68827


    Title: 基於Schnorr身分認證之單次通行碼機制;One-time Password Schemes Based on the Schnorr Identification
    Authors: 簡旭璋;Chien,Hsu-chang
    Contributors: 資訊工程學系
    Keywords: 身分認證;單次通行碼;Schnorr身分認證;Authentication;One-time Password;Schnorr′s Identification Protocol
    Date: 2015-07-28
    Issue Date: 2015-09-23 14:44:21 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 遠端使用者身分認證是資訊安全中最重要的議題之一,伺服器端能透過身分認證過濾非法的使用者,使合法的使用者能夠存取遠端服務。以通行碼為基礎之身分認證機制是目前最常被使用在網際網路上的方法。在單次通行碼機制中,使用者每次登錄時所使用的通行碼是動態改變的。本論文之目的在於提出一個單次通行碼機制,其對使用者來說具有計算量及儲存空間高效率性,登錄驗證回合數最簡化,並且無須進行時戳同步之特性。我們重新造訪了基於挑戰-回應技巧之Schnorr身分認證機制,我們發現了重複使用挑戰值的技巧以應用在單次通行碼機制中。在本論文中,我們提出兩個基於Schnorr身分認證之單次通行碼機制。第一個機制提供了單向認證,並且能抵抗重送攻擊、暴力攻擊、偽冒攻擊、驗證碼竊取攻擊、驗證表竄改攻擊以及伺服器入侵攻擊。此外,此機制也適合應用在智慧卡登錄系統中。第二個機制提供了雙向認證與會議金鑰產生協議,並且能抵抗重送攻擊、暴力攻擊、偽冒攻擊、中間人攻擊、反射攻擊以及平行會期攻擊。;Authentication ensures that servers′ services can only be obtained by legitimate users.
    The password-based authentication scheme is regarded as one of the most generally used methods of authentication on the internet. In one-time password authentication schemes, users′ passwords are dynamically changed in each user login. The purpose of this thesis is to propose a secure and practical one-time password scheme that is computation efficient, storage efficient, interaction minimization, and time-stamp synchronization free for the prover. We revisit the challenge-response based Schnorr identification protocol. Our idea comes from reusing a challenge with different commitments in the Schnorr identification protocol, and we also give a brief security analysis to explain why this kind of challenge-reused version is secure. In this thesis, two one-time password schemes based on this modified Schnorr identification protocol are proposed. The preliminary scheme provides unilateral authentication and can resist the replay attack, brute force attack, impersonation attack, stolen verifier attack, verification-table tampering attack, and server compromise attack. In addition, this scheme is practical for smart card applications. The enhanced scheme provides mutual authentication and session key agreement, and it can resist the replay attack, impersonation attack, brute force attack, man-in-the-middle attack, reflection attack, and parallel session attack.
    Appears in Collections:[Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML203View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明