基于混沌动态密码的网络身份认证系统的研究
[Abstract]:The rapid development of the Internet has brought about the transformation of network identity authentication technology. As a new authentication technology, dynamic cryptography has been widely used in electronic commerce, online transactions, electronic games and so on. Chaos has three characteristics: initial value sensitive, aperiodic and unpredictable, which agree well with the unpredictable characteristic of dynamic cryptography. Using chaos, a dynamic cryptographic algorithm with excellent performance can be constructed. At present, there are few dynamic cryptographic solutions with independent intellectual property rights in China, so it is of strategic significance to study chaotic dynamic cryptography algorithms. Based on the above background, a new dynamic cryptographic algorithm is designed by constructing an improved Lorenz hyperchaotic system. In order to verify the practicability and feasibility of the algorithm, a network identity authentication system is constructed. The chaotic dynamic cryptography algorithm is implemented in the system and the identity authentication experiment is carried out. The main contents of this paper are as follows: (1) the basic theory of chaos is introduced, including the definition, the basic characteristics and the method of judging chaos. The relation between chaotic hash function and chaotic dynamic cipher is discussed. The basic theory of chaotic dynamic cryptography is described in detail, including definition, basic characteristics, life cycle and dynamic cryptographic terminal. (2) based on the Lorenz system, an improved Lorenz hyperchaotic system is constructed by introducing a feedback term. The construction method of the system is introduced, and the basic characteristics of the system are analyzed. SOPC and HTML5 are used to realize the system digitally. The key technologies of SOPC and HTML5 implementation are introduced in detail. The digital implementation shows that the linear transformation of chaotic system will not change the integrity of the phase. (3) based on the improved Lorenz hyperchaotic system and the dynamic cryptography mechanism of challenge / response, a new chaotic dynamic cryptography algorithm is constructed, including the dynamic cryptography generation algorithm and the challenge code generation algorithm. Token encryption algorithm and dynamic cryptographic matching algorithm. (4) in order to ensure the security performance of the system, the improved Lorenz hyperchaotic system is tested randomly through the sts-2.0b test package provided by the American National Institute of National Standards and Technology (NIST (National Institute of Standards and Technology,). It is proved that the system meets the requirements of randomness. In order to ensure the performance of the algorithm, the overall performance of the chaotic dynamic cryptography algorithm is evaluated and analyzed, including time complexity, space complexity, hash performance and key space analysis. (5) A scheme of network identity authentication based on Apache server is studied, the protocol of network identity authentication is designed, and the overall design scheme is described in detail. Using PHP language programming, an experimental network identity authentication system is implemented. On the basis of chaotic dynamic cryptography algorithm, three common terminals of dynamic cryptography are implemented: mobile phone token, software token and short message password. The key steps and technical scheme of dynamic cryptographic terminal are introduced. The security performance of the system is analyzed through system experiments, and the feasibility of chaotic dynamic cryptography algorithm is illustrated.
【学位授予单位】:杭州电子科技大学
【学位级别】:硕士
【学位授予年份】:2013
【分类号】:TN918
【参考文献】
相关期刊论文 前10条
1 周福才,朱伟勇;基于混沌理论身份认证的研究[J];东北大学学报;2002年08期
2 陈维;王光义;;一个变参数变结构混沌系统及其数字化实现[J];电路与系统学报;2011年06期
3 徐锋;;Web3.0的密码保护管理策略[J];计算机安全;2011年07期
4 吴琴琴;王光义;;一个改进的混沌系统及其LabVIEW实现[J];杭州电子科技大学学报;2010年02期
5 张坦通;王光义;;一种连续混沌的分析及量化实现方法[J];杭州电子科技大学学报;2010年02期
6 王莹;王光义;;混沌PN序列的DSP实现及其性能分析[J];杭州电子科技大学学报;2012年01期
7 黄玉划;胡爱群;王兴建;;基于三重分组链接的散列函数及其性能分析[J];计算机研究与发展;2006年08期
8 何明星,林昊;AES算法原理及其实现[J];计算机应用研究;2002年12期
9 刘军宁,谢杰成,王普;基于混沌映射的单向Hash函数构造[J];清华大学学报(自然科学版);2000年07期
10 廖光忠;胡静;;基于PPTP协议和混沌理论认证的VPN的实现[J];计算机工程与设计;2007年14期
相关硕士学位论文 前4条
1 杜立健;基于SOPC的混沌加密技术的研究[D];华北电力大学(北京);2007年
2 黄泽鑫;基于动态密码认证的防水墙研究[D];武汉科技大学;2009年
3 于盼盼;周期离散系统的混沌[D];山东大学;2009年
4 陈阳;基于混沌加密的网上银行身份认证技术研究[D];长春理工大学;2010年
本文编号:2299640
本文链接:https://www.wllwen.com/falvlunwen/zhishichanquanfa/2299640.html