Font Size: a A A

Design And Research Of Identity Authentication Scheme Based On Chaotic Map

Posted on:2020-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:S W WangFull Text:PDF
GTID:2480305972467344Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet,the network has penetrated into all aspects of people's lives.However,in an open network environment,network security has always been a hot topic.Identity authentication is an important means to ensure the security of network information.Identity authentication has been widely used in many Internet fields and played a huge role in ensuring information security.Since the Chebyshev polynomial chaotic map has higher computational efficiency than the traditional public key algorithm,it has become a hot topic in recent research.In this paper,the authentication protocol based on Chebyshev polynomial chaotic map is studied,and the existing protocol is analyzed.At the same time,a new protocol scheme is proposed.The main research results are as follows:1)Analyze the security problems existing in the agreement of Li et al.,such as users posing as attacks,vulnerable to denial of service attacks,and unable to ensure the uniqueness of user identity.Then we gave an improved authentication protocol and analyzed its security to prove it can resist common attacks.2)With the development of biometric technology,biometric features such as fingerprints,faces,and irises are gradually being applied to people's lives,such as mobile phone fingerprint authentication,bank ATM machine brushing,etc.,in contrast to traditional authentication methods.Compared,the three-factor authentication protocol based on password,smart card and biometrics has higher security.We also give a three-factor authentication protocol based on chaotic mapping.
Keywords/Search Tags:Chaotic Mapping, Biometric, Password, Smart card, Authentication Scheme
PDF Full Text Request
Related items