基于混沌動態(tài)密碼的網(wǎng)絡(luò)身份認(rèn)證系統(tǒng)的研究
[Abstract]:The rapid development of the Internet has brought about the transformation of network identity authentication technology. As a new authentication technology, dynamic cryptography has been widely used in electronic commerce, online transactions, electronic games and so on. Chaos has three characteristics: initial value sensitive, aperiodic and unpredictable, which agree well with the unpredictable characteristic of dynamic cryptography. Using chaos, a dynamic cryptographic algorithm with excellent performance can be constructed. At present, there are few dynamic cryptographic solutions with independent intellectual property rights in China, so it is of strategic significance to study chaotic dynamic cryptography algorithms. Based on the above background, a new dynamic cryptographic algorithm is designed by constructing an improved Lorenz hyperchaotic system. In order to verify the practicability and feasibility of the algorithm, a network identity authentication system is constructed. The chaotic dynamic cryptography algorithm is implemented in the system and the identity authentication experiment is carried out. The main contents of this paper are as follows: (1) the basic theory of chaos is introduced, including the definition, the basic characteristics and the method of judging chaos. The relation between chaotic hash function and chaotic dynamic cipher is discussed. The basic theory of chaotic dynamic cryptography is described in detail, including definition, basic characteristics, life cycle and dynamic cryptographic terminal. (2) based on the Lorenz system, an improved Lorenz hyperchaotic system is constructed by introducing a feedback term. The construction method of the system is introduced, and the basic characteristics of the system are analyzed. SOPC and HTML5 are used to realize the system digitally. The key technologies of SOPC and HTML5 implementation are introduced in detail. The digital implementation shows that the linear transformation of chaotic system will not change the integrity of the phase. (3) based on the improved Lorenz hyperchaotic system and the dynamic cryptography mechanism of challenge / response, a new chaotic dynamic cryptography algorithm is constructed, including the dynamic cryptography generation algorithm and the challenge code generation algorithm. Token encryption algorithm and dynamic cryptographic matching algorithm. (4) in order to ensure the security performance of the system, the improved Lorenz hyperchaotic system is tested randomly through the sts-2.0b test package provided by the American National Institute of National Standards and Technology (NIST (National Institute of Standards and Technology,). It is proved that the system meets the requirements of randomness. In order to ensure the performance of the algorithm, the overall performance of the chaotic dynamic cryptography algorithm is evaluated and analyzed, including time complexity, space complexity, hash performance and key space analysis. (5) A scheme of network identity authentication based on Apache server is studied, the protocol of network identity authentication is designed, and the overall design scheme is described in detail. Using PHP language programming, an experimental network identity authentication system is implemented. On the basis of chaotic dynamic cryptography algorithm, three common terminals of dynamic cryptography are implemented: mobile phone token, software token and short message password. The key steps and technical scheme of dynamic cryptographic terminal are introduced. The security performance of the system is analyzed through system experiments, and the feasibility of chaotic dynamic cryptography algorithm is illustrated.
【學(xué)位授予單位】:杭州電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2013
【分類號】:TN918
【參考文獻】
相關(guān)期刊論文 前10條
1 周福才,朱偉勇;基于混沌理論身份認(rèn)證的研究[J];東北大學(xué)學(xué)報;2002年08期
2 陳維;王光義;;一個變參數(shù)變結(jié)構(gòu)混沌系統(tǒng)及其數(shù)字化實現(xiàn)[J];電路與系統(tǒng)學(xué)報;2011年06期
3 徐鋒;;Web3.0的密碼保護管理策略[J];計算機安全;2011年07期
4 吳琴琴;王光義;;一個改進的混沌系統(tǒng)及其LabVIEW實現(xiàn)[J];杭州電子科技大學(xué)學(xué)報;2010年02期
5 張?zhí)雇?王光義;;一種連續(xù)混沌的分析及量化實現(xiàn)方法[J];杭州電子科技大學(xué)學(xué)報;2010年02期
6 王瑩;王光義;;混沌PN序列的DSP實現(xiàn)及其性能分析[J];杭州電子科技大學(xué)學(xué)報;2012年01期
7 黃玉劃;胡愛群;王興建;;基于三重分組鏈接的散列函數(shù)及其性能分析[J];計算機研究與發(fā)展;2006年08期
8 何明星,林昊;AES算法原理及其實現(xiàn)[J];計算機應(yīng)用研究;2002年12期
9 劉軍寧,謝杰成,王普;基于混沌映射的單向Hash函數(shù)構(gòu)造[J];清華大學(xué)學(xué)報(自然科學(xué)版);2000年07期
10 廖光忠;胡靜;;基于PPTP協(xié)議和混沌理論認(rèn)證的VPN的實現(xiàn)[J];計算機工程與設(shè)計;2007年14期
相關(guān)碩士學(xué)位論文 前4條
1 杜立健;基于SOPC的混沌加密技術(shù)的研究[D];華北電力大學(xué)(北京);2007年
2 黃澤鑫;基于動態(tài)密碼認(rèn)證的防水墻研究[D];武漢科技大學(xué);2009年
3 于盼盼;周期離散系統(tǒng)的混沌[D];山東大學(xué);2009年
4 陳陽;基于混沌加密的網(wǎng)上銀行身份認(rèn)證技術(shù)研究[D];長春理工大學(xué);2010年
本文編號:2299640
本文鏈接:http://sikaile.net/falvlunwen/zhishichanquanfa/2299640.html