政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/70997
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 51060968      Online Users : 925
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/70997


    Title: 多伺服器環境中基於智慧卡的身分認證機制之研究
    A Study on Smart Card Based User Authentication Mechanism for Multi-Server Environments
    Authors: 張詠詠
    Chang, Yung Yung
    Contributors: 左瑞麟
    Tso, Ray Lin
    張詠詠
    Chang, Yung Yung
    Keywords: 智慧卡
    身分驗證機制
    Diffie-Hellman密鑰交換
    Smart card
    Authentication mechanism
    Diffie-Hellman key exchange
    Date: 2014
    Issue Date: 2014-11-03 10:11:55 (UTC+8)
    Abstract: 隨著科技的進步,智慧卡的種類漸增,功能也愈趨完善,生活中需要使用到智慧卡的時機也愈來愈頻繁,與之相對的,其安全性也愈加受到重視,尤其在卡片遺失的情形下,必須做到卡片中留存的資料就算被有心人士竊取,也無法從中得出使用者密碼(password),藉以偽冒成合法使用者,如此才能確保卡片使用者的安全。為了達到此一目的,許多學者在智慧卡的安全機制上做了許多的研究,如:2012年學者Cheng等人提出了一個基於智慧卡的遠端使用者登錄認證機制。同一時期,學者Li等人也提出了多伺服器網路中,基於密碼驗證的智慧卡認證機制。本研究中,我們發現Cheng等人及Li等人所自訂之智慧卡認證協議,在智慧卡遺失的情況下,並未提供完整的保密環境,導致其使用者與伺服器雙方所建立的秘鑰與會議金鑰可能被破解而無法得知。因此,我們提出了改良版的基於邏輯運算的智慧卡身分驗證機制,加入Diffie-Hellman密鑰交換,以達到更具安全性的目標。
    With advances in technology, different types and functions of smart cards have become more popular and perfect in recent years. We use smart cards in daily life more and more frequent, so smart card security has become a very important issue, especially in the case of smart-card-loss. We have to ensure that if our card is lost and someone steals the sensitive data in our card, he/she cannot use it to guess or get user’s password. To achieve the goal, many researchers have done a lot of work in smart card security. In 2012 Cheng et al. proposed a smart card based authentication scheme for remote user login and verification. During the same period, Li et al. proposed a password and smart card based user authentication mechanism for multi-server environments. In this thesis, we first pointed out the security flaws of Cheng et al.’s and Li et al.’s mechanism. We found that Cheng et al.’s and Li et al.’s mechanism cannot be secure under offline-dictionary attack in the smart-card-loss case. This enables adversaries to guess user’s password and session keys. Secondly, we introduced an improved version of smart card based authentication mechanism using Diffie-Hellman key exchange to overcome the above mentioned problems
    Reference: [1] C. Chang, T. Cheng, “A robust and efficient smart card based remote login mechanism for multi-server architecture,” International Journal of Innovative
    Computing, Information and Control, Vol. 7, No. 8, pp. 4589–4602, 2011.

    [2] T. Chen, H. Hsiang and W. Shih, “Security enhancement on an improvement on two remote user authentication schemes using smart cards,” Future Generation Computer Systems, Vol. 27, No. 4, pp. 377-380, 2011.

    [3] Z. Cheng, Y. Liu, C. Chang, S. Chang, “A smart card based authentication scheme for remote user login and verification,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 8, pp. 5499-5511, 2012.

    [4] W. Diffie, and M. Hellmen, “New Directions in Cryptography,” IEEE Transactions on information Theory, Vol. 22, No. 6, pp. 644-654, 1976.

    [5] C. Guo, C. Chang, “Chaotic maps-based password-authenticated key agreement using smart cards,” Communications in Nonlinear Science and Numerical Simulation, pp. 1433-1440, 2013.

    [6] M. Hendry, “Multi-application smart cards ─ Technology and applications,” Cambridge University Press, 2007.

    [7] X. Huang, X. Chen, J. Yang, L. Xu, “Further observations on smart-card-based password-authenticated key agreement in distributed systems,” IEEE Transactions on Parallel and Distributed Systems, 09 Sept. 2013. Doi:http://dx.doi.org/10.1109/TPDS.2013.230

    [8] W. Juang, “Efficient multi-server password authenticated key agreement using smart cards,” IEEE Transactions on Consumer Electronics, Vol. 50, No.1, pp. 251-255, 2004.

    [9] J. Lee, D. Lee, “Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment,” the 26th International Conference on Consumer Electronics, pp.1–2, 2008.

    [10] C. Li, “A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card,” Institution of Engineering and Technology, Vol. 7, Issue. 1, pp. 3-10, 2012.

    [11] C. Li, C. Lee, “A novel user authentication and privacy preserving scheme with smart cards for wireless communications,” Advanced Theory and Practice for Cryptography and Future Security, pp. 35–44, 2012.

    [12] C. Li, C. Lee, H. Mei, C. Yang, “A password and smart card based user authentication mechanism for multi-server environments,” the 6th International Conference on Information Security and Assurance (ISA 2012), pp. 28-30, 2012.

    [13] I. Lin, M. Hwang, L. Li, “A new remote user authentication scheme for multi-server
    architecture,” Future Generation Computer Systems, Vol.19, No.1, pp. 13-22, 2003.

    [14] R.S. Pippal, R. Ahirwar, S.S. Kushwah, P. Yadav, “A secure SCAM (Smart Card based Authentication Mechanism),” International Journal of Computer Applications May 2013, Vol.72, No.5, pp. 26-31, 2013.

    [15] K. Shin, “A study on analysis of a Hsiang et al.’s authentication scheme,” SoftTech 2013, ASTL Vol. 19, pp. 53-56, 2013.

    [16] S. Sood, “An improved and secure smart card based dynamic identity authentication protocol,” International Journal of Network Security, Vol. 14, No. 1, pp. 39-46, 2012.

    [17] X. Wang, W. Zhang, J. Zhang and M. K. Khan, “Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards,” Computer Standard & Interfaces, Vol. 29, No. 5, pp. 507-512, 2007.

    [18] M. Hendry著、陸建偉、黃榮林、陳智明譯,《多功能智慧卡--科技及應用》,財團法人台灣金融研訓院,2007。

    [19] 林祝興、張明信,《資訊安全導論》,旗標出版社,2009。

    [20] 結城浩著、左瑞麟譯,《密碼學與網路安全應用》,旗標出版社,2011。

    [21] 謝文恭、涂承澔,〈以多項式為基礎的智慧卡認證協議之安全缺漏〉,「2013資訊安全技術創新應用研討會論文集」, 頁35-38,2013。

    [22] 梁伶君,〈智慧卡簡介與校園應用趨勢〉, 《NCKU 圖書館館勘第四期》,1999。

    [23] ISO7816, http://www.cardwerk.com/smartcards/smartcard_standard_ISO7816-4_5_basic_organizations.aspx
    Description: 碩士
    國立政治大學
    資訊科學學系
    100971019
    103
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0100971019
    Data Type: thesis
    Appears in Collections:[Department of Computer Science ] Theses

    Files in This Item:

    File SizeFormat
    index.html0KbHTML2335View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback