Font Size: a A A

Optimization Research And Engineering Implementation Of Oauth2.0 Authorization And Delegation Protocol

Posted on:2024-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2568306920993579Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
OAuth2.0 is used for Web application authentication and authorization and is widely used by large open platforms.Currently reports say that Google and Facebook logins have been used by more than 2.8 billion applications,which is a huge number,and because of this,security has been a concern.In OAuth2.0 specification,authorization processing mechanism,token format and encryption method are not defined.Traditional implementation technology and encryption algorithm still have security threats in terms of protecting access credentials.To solve the above problems,this paper introduces DESTH ELGamal hybrid encryption algorithm,introduces the process of plaintext processing through binary random sequence,and the scheme of ELGamal algorithm to exchange the key of binary random sequence and DESTH algorithm between servers,so as to improve DESTH ELGamal hybrid encryption algorithm.Using an improved hybrid encryption algorithm to encrypt the access credentials in the OAuth2.0 protocol,the SHA-512 hash algorithm is combined with the ELGamal algorithm key to achieve signature during the transmission process of the access credentials.Finally,the access credentials are encapsulated in JWT format and sent to the target server,achieving overall optimization of the OAuth2.0 protocol.On this basis,in order to ensure more secure authentication and information exchange,this article evaluates the optimized protocol from both functional and performance aspects.Using Spring Cloud and the Spring Security framework,a simple,effective,and secure unified identity authentication platform based on the optimized OAuth2.0 protocol was designed and implemented.This platform integrates information systems from different regions to achieve identity authentication and authorization within the domain,while integrating single sign on functionality to achieve simple and efficient resource access and sharing.Finally,formal security verification was performed on the optimized protocol using the probability based model detection tool Prism.Based on the analysis of the results of time delay probability,no vulnerabilities were found in the new protocol.
Keywords/Search Tags:Hybrid encryption algorithm, Binary random sequence, Optimization of OAuth2.0, Formal verification, Single Sign-On
PDF Full Text Request
Related items