An Identity Authentication Protocol Based on SM2 and Fingerprint USBkey

نویسندگان

  • Lihua Zhang
  • Xichang Dai
  • Youjin Shen
چکیده

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint USBkey. The proposed scheme,which Combines the fingerprint USBkey of fingerprint certificate with the National cipher algorithm SM2, constructs the multi -factor authentication model. And the scheme obtains many merits:1) it adopts the challenge response authentication mechanism, and realizes the multi-factor mutual authentication.2) it implements USBkey to verify the user and the remote server authentication by fingerprint features. 3) it can prevent eavesdropping attack, impersonation attack, replay attack and dos attack effectively. 4) it has better calculation and security performance than the existed schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiscale Recognition Algorithm for Eye Ground Texture Based on Fusion Threshold Equalization

In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...

متن کامل

Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication

In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such a...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Authentication protocol for fingerprint feature extraction and IBC in monitoring systems

Authentication methods based on biometric parameters are gaining importance over the years. But they require the storage and transmission security of fingerprint templates to perform this task. In this work an efficient method based on digital fingerprint random encryption IBC is introduced. The process works by user’s fingerprint feature and asymmetric authentication technology to security imp...

متن کامل

M-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications

Mobile commerce (m-commerce) delivers value-added services to existing customers and creates new market opportunities. However, establishing a secure m-commerce platform that offers high level of service can be challenging. This paper proposes a biometric-based digital identity authentication (BDIA) protocol targeted at m-commerce applications. In the BDIA protocol, m-identity includes both use...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Multimedia

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014