The Design and Implementation of the Wireless Network Identity Authentication System based on the Hybrid Encryption Algorithm

被引:0
|
作者
Xu, Yongbing [1 ]
Wang, Junyi [1 ]
机构
[1] Inner Mongolia Univ, Coll Comp, Hohhot 010021, Peoples R China
关键词
Wi-Fi; Identity Authentication; SM2; SM4;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wi-Fi is a combination of the computer network and wireless communication technology. It uses wireless channel to access networks. With its characteristics of high speed, flexible, easy to manage and extension, etc, it has quickly become one of the most effective way of broadband access. But it was also because of it is widely used, gives some people with bad intent an opportunity. In this text, based on SM2 and SM4 algorithm which is recommended by the state password administration, a hybrid encryption algorithm has been designed and a Wi-Fi identity authentication system has been implemented, to increase security on the basis of ensure the Wi-Fi use convenience.
引用
收藏
页码:303 / 306
页数:4
相关论文
共 50 条
  • [1] File Encryption System Design Based on USB Identity Authentication
    Li, Ping
    Li, Li
    Liang, YunJuan
    Zhang, LiJun
    [J]. 2011 SECOND ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2011), VOL 1, 2011, : 60 - 62
  • [2] Design of Wireless Network Authentication System Based on Cloud
    Lee, Hyungju
    Jung, Yonghwan
    Lee, Heang-Gon
    Choi, Jangwon
    Cho, Hyunhun
    [J]. ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2547 - 2552
  • [3] Design and implementation of an integrated identity authentication system based on SAML
    Guo Lei
    Liu Lian-zhong
    [J]. Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 1118 - 1121
  • [4] Design and Implementation of the Uniform Identity Authentication System Based on LDAP
    Lin, Jian
    Yan, Hua
    Wu, Bing
    [J]. EMERGING RESEARCH IN WEB INFORMATION SYSTEMS AND MINING, 2011, 238 : 211 - +
  • [5] Design and Implementation of Uniform Identity Authentication on Campus Network Based on LDAP
    Zhang, Mu
    [J]. 2011 INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2011), VOL III, 2011, : 508 - 511
  • [6] Design of the Identity Authentication and Key Management System Based on Wireless Community
    Wang Linsheng
    Zhou Ke
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 224 - 229
  • [7] Design and Implementation of Identity Authentication System Based on Fingerprint Recognition and Cryptography
    Feng Fujun
    Li Xinshe
    Wang Litao
    [J]. 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 254 - 257
  • [8] New Authentication Algorithm Based on Verifiable Encryption with Digital Identity
    Kihara, Maki
    Iriyama, Satoshi
    [J]. CRYPTOGRAPHY, 2019, 3 (03) : 1 - 18
  • [9] Design and Implementation of Network Video Encryption System Based on STM32 and AES Algorithm
    Tian, Xingyu
    Fan, Chunlei
    Liu, Jia
    Ding, Qun
    [J]. ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 51 - 58
  • [10] The design and implementation of dynamic password identity authentication system
    Wang, Xuejun
    [J]. INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 583 - 588