Dynamic password authentication method for resisting man-in-the-middle attack

A dynamic password and authentication method technology, applied in the field of information security, can solve problems such as inability to resist password guessing attacks or man-in-the-middle attacks, and inability to achieve two-way authentication

Active Publication Date: 2021-01-15
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a dynamic password authentication method against man-in-the-middle attacks. The main problem to be solved by the present invention is: the current design of dynamic password authentication protocols either cannot resist password guessing attacks or man-in-the-middle attacks, or cannot realize two-way Certification, and poor convenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic password authentication method for resisting man-in-the-middle attack
  • Dynamic password authentication method for resisting man-in-the-middle attack
  • Dynamic password authentication method for resisting man-in-the-middle attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] Example 1, see Figure 1 to Figure 4 , this embodiment proposes a new design of a smart card-based dynamic password authentication protocol in order to solve the security and convenience problems of password authentication technology. This embodiment utilizes the RSA difficult problem and smart card technology to improve authentication efficiency.

[0074] For a clearer and brief description, the concept of user Alice is introduced in this embodiment. User Alice means user Alice herself, and also means user Alice's mobile terminal or fixed terminal. The mobile terminal can be a smart phone, a tablet, or a handheld computer. , the fixed terminal may be a desktop computer, etc., and in this embodiment, the two are regarded as the same execution subject.

[0075] A dynamic password authentication method against man-in-the-middle attacks, including: a registration phase and a login phase;

[0076] see figure 1 and figure 2 , the registration phase includes the following...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic password authentication method for resisting man-in-the-middle attack. The method mainly comprises a registration stage and a login stage, is designed on the basis ofRSA difficulty, and can effectively resist man-in-the-middle attack and offline password guessing attack, and compared with a conventional password authentication scheme, the method has the advantages that in the authentication process, the times of executing encryption and decryption operations by a user and a server are reduced, and the authentication efficiency is improved; the remote login problem of a user can be conveniently solved, login information does not need to be stored in a public computer, and the login process is safer; violent cracking attack and man-in-the-middle attack on apassword can be effectively resisted, and meanwhile, bidirectional authentication is added, so that the problem of pseudo server attack is solved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a dynamic password authentication method against man-in-the-middle attacks. Background technique [0002] Since the password authentication technology came out, due to its convenience and relative security, it has been widely used in every aspect of our life. From the login of the website account to the convenient mobile payment, the password can be seen anytime and anywhere. But with the widespread use of authentication technology, it also brings a series of hidden dangers. Due to the limited key space of the password itself, it is vulnerable to online or offline guessing attacks and man-in-the-middle attacks. [0003] One way to solve these security risks is to use one-time password technology, also known as dynamic password technology. The classic dynamic password technology such as S / KEY has the problem of limited login times, and the subsequent design of SAS and its up...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0825H04L9/0869H04L9/3228H04L9/3234H04L9/3239H04L9/3273H04L63/1466
Inventor 王少辉王平邓志辉王志伟王化群
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products