The Design and Implementation of Password authentication System Based on chaos

被引:0
|
作者
Jiang, Nan [1 ]
Yang, Ri-jing [1 ]
Liu, Xiang-dong [1 ]
机构
[1] Dalian Nationalities Univ, Sch Comp Sci & Engn, Dalian, Peoples R China
关键词
chaotic system; Hash function; one time password; authentication; system design and implement; HASH FUNCTIONS;
D O I
10.1109/IWCFTA.2009.50
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposed the construction algorithm of chaotic Hash function based on Henon-like mapping, and designed one password authentication scheme on basis of chaotic scramble sort algorithm and chaotic Hash function; it also resolved the insecurity problems that can't resist little numbers attack, the iteration times of plaintext transmission and the attack of fraud server in the scheme. It finally implemented the one time password authentication system based on chaotic scramble sort table and chaotic Hash function.
引用
收藏
页码:205 / 208
页数:4
相关论文
共 50 条
  • [1] The design and implementation of dynamic password identity authentication system
    Wang, Xuejun
    [J]. INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 583 - 588
  • [2] Implementation of Password-based Key Derivation Function for Authentication Scheme in Patrolling System
    Saputra, Laurentius Kuncoro Probo
    Raharjo, Willy Sudiarto
    [J]. PROCEEDINGS OF 2019 5TH INTERNATIONAL CONFERENCE ON NEW MEDIA STUDIES (CONMEDIA 2019), 2019, : 31 - 35
  • [3] Alignment based graphical password authentication system
    Danish, Abutalha
    Sharma, Labhya
    Varshney, Harshit
    Khan, Asad Mohammed
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2950 - 2954
  • [4] Cryptanalysis of Password Authentication System
    Aboud, Sattar J.
    Al-fayoumi, Mohammad
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 14 - 17
  • [5] User authentication by secured graphical password implementation
    Bandyopadhyay, Samir Kumar
    Bhattacharyya, Debnath
    Das, Poulami
    [J]. 2008 7TH ASIA-PACIFIC SYMPOSIUM ON INFORMATION AND TELECOMMUNICATION TECHNOLOGIES, 2008, : 7 - +
  • [6] VLSI implementation of password (PIN) authentication unit
    Sklavos, N
    Kitsos, P
    Koufopavlou, O
    [J]. ICES 2002: 9TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS I-111, CONFERENCE PROCEEDINGS, 2002, : 1147 - 1150
  • [7] Design and Implementation of an IoT Based Secure Biometric Authentication System
    Joshy, Annies
    Jalaja, M. J.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2017,
  • [8] Design and implementation of an integrated identity authentication system based on SAML
    Guo Lei
    Liu Lian-zhong
    [J]. Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 1118 - 1121
  • [9] Design and Implementation of the Uniform Identity Authentication System Based on LDAP
    Lin, Jian
    Yan, Hua
    Wu, Bing
    [J]. EMERGING RESEARCH IN WEB INFORMATION SYSTEMS AND MINING, 2011, 238 : 211 - +
  • [10] Design of Dynamic Password Authentication Scheme Based on SM Algorithm
    Xiaoqi Liang
    Yong Wang
    Xichao Yue
    [J]. 2022 12TH INTERNATIONAL CONFERENCE ON POWER AND ENERGY SYSTEMS, ICPES, 2022, : 57 - 61