基于切比雪夫多项式的匿名认证协议设计与研究
[Abstract]:With the rapid development of network technology, people's life will be more closely related to the network, and more attention will be paid to the problem of network security. Cryptography-based security authentication protocol can ensure people's communication security in an open and complex network environment, so it has attracted many experts and scholars to carry out in-depth research in this field. The design of authentication protocol often wants to be more efficient and more secure. The security authentication protocol based on Chebyshev multinomial has higher computational efficiency than the traditional security authentication protocol based on RSA or Elliptic Curve Cryptography. In recent years, There are more and more research results in this field. In this paper, the anonymous authentication protocol based on Chebyshev multinomial is studied. After briefly reviewing the protocol of Zhu, we point out five problems in its protocol: the existence of user impersonation attack, which can not provide user anonymity, the vulnerability to offline dictionary attack, and the low efficiency of password change scheme. There are defects in the login phase design. Then, based on the Zhu protocol, we propose a new authentication protocol based on Chebyshev multinomial, which is better in security performance and computational efficiency, and can resist all common attacks. We continue to propose a tripartite authentication protocol based on Chebyshev multinomial, which can still provide anonymity and join a trusted third party, so that the protocol can be applied to a larger network environment. The main contents of this paper are as follows: in the first chapter, the research background and present situation of security protocol based on Chebyshev Polynomials are introduced. The second chapter introduces some basic concepts and theories that will be used in the following chapters. In chapter 3, the security protocol based on Chebyshev multinomial proposed by Zhu is reviewed and its security defects are analyzed. In the fourth chapter, based on the protocol proposed by Zhu, an improved protocol is proposed, and the security analysis is carried out, and the formal proof of BAN logic is carried out. Finally, the performance of the protocol is compared with that of other related protocols. In chapter 5, a tripartite authentication protocol based on Chebyshev multinomial is proposed, and the security analysis and formal security proof are carried out. finally, the performance of the protocol is compared with that of other related protocols. The sixth chapter summarizes the full text and research prospects.
【学位授予单位】:武汉大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08
【相似文献】
相关期刊论文 前10条
1 王中德;;两类新的切比雪夫多项式[J];北京邮电学院学报;1989年02期
2 易念学,卜斌龙;切比雪夫最佳分布系数的简捷计算方法[J];中国空间科学技术;1992年03期
3 顾乐民;;预测型切比雪夫多项式[J];计算机工程与应用;2012年07期
4 李建瀛,尹应增,,刘其中;切比雪夫多项式系数特性及其在天线综合中的应用[J];电波科学学报;1995年Z1期
5 倪海东;陈义;;切比雪夫多项式拟合方法在车辆导航应用中的研究[J];全球定位系统;2009年06期
6 史丽萍,孙宝元,于浩洋;切比雪夫多项式回归分析方法在测量数据处理中的应用[J];黑龙江大学自然科学学报;2003年02期
7 刘晓刚;吴晓平;田颜锋;邓禹;;利用切比雪夫多项式模型进行时间预报的研究[J];大地测量与地球动力学;2010年01期
8 肖蒙;李军;;切比雪夫多项式及其插值法在检测中的应用研究[J];自动化与仪器仪表;2006年03期
9 冯宇,宋建平,钱兴中;切比雪夫多项式系数特性及其在阻抗变换器中应用[J];信息工程大学学报;2005年04期
10 赵金伟;冯博琴;闫桂荣;;泛化的统一切比雪夫多项式核函数[J];西安交通大学学报;2012年08期
相关会议论文 前2条
1 王建奇;王行愚;;利用切比雪夫多项式求解时滞系统的无穷时间线性二次型反馈控制律[A];1989年控制理论及其应用年会论文集(中)[C];1989年
2 曹文涛;郭际明;;基于切比雪夫多项式的GPS轨道标准化方法[A];第三届中国卫星导航学术年会电子文集——S08卫星导航模型与方法[C];2012年
相关博士学位论文 前1条
1 李扬;关于斐波那契多项式与切比雪夫多项式的一些恒等式[D];西北大学;2015年
相关硕士学位论文 前2条
1 童彤;基于切比雪夫多项式的匿名认证协议设计与研究[D];武汉大学;2017年
2 孔圆圆;动态性状基因位点定位的方法研究[D];黑龙江大学;2014年
本文编号:2480060
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2480060.html