An Identity Authentication Protocol Based on SM2 and Fingerprint USBkey
نویسندگان
چکیده
In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint USBkey. The proposed scheme,which Combines the fingerprint USBkey of fingerprint certificate with the National cipher algorithm SM2, constructs the multi -factor authentication model. And the scheme obtains many merits:1) it adopts the challenge response authentication mechanism, and realizes the multi-factor mutual authentication.2) it implements USBkey to verify the user and the remote server authentication by fingerprint features. 3) it can prevent eavesdropping attack, impersonation attack, replay attack and dos attack effectively. 4) it has better calculation and security performance than the existed schemes.
منابع مشابه
Multiscale Recognition Algorithm for Eye Ground Texture Based on Fusion Threshold Equalization
In order to solve network security problem, we need identity authentication protocol to ensure legal user’s authority. Multi-factor identity authentication protocols have more merits than the common identity authentication protocol. This paper analyzes the shortcomings of existing network identity authentication methods, and proposes a new authentication protocol based on SM2 and fingerprint US...
متن کاملSoftware-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication
In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such a...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملAuthentication protocol for fingerprint feature extraction and IBC in monitoring systems
Authentication methods based on biometric parameters are gaining importance over the years. But they require the storage and transmission security of fingerprint templates to perform this task. In this work an efficient method based on digital fingerprint random encryption IBC is introduced. The process works by user’s fingerprint feature and asymmetric authentication technology to security imp...
متن کاملM-Identity and Its Authentication Protocol for Secure Mobile Commerce Applications
Mobile commerce (m-commerce) delivers value-added services to existing customers and creates new market opportunities. However, establishing a secure m-commerce platform that offers high level of service can be challenging. This paper proposes a biometric-based digital identity authentication (BDIA) protocol targeted at m-commerce applications. In the BDIA protocol, m-identity includes both use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Multimedia
دوره 9 شماره
صفحات -
تاریخ انتشار 2014