基于切比雪夫多項式的匿名認證協(xié)議設(shè)計與研究
[Abstract]:With the rapid development of network technology, people's life will be more closely related to the network, and more attention will be paid to the problem of network security. Cryptography-based security authentication protocol can ensure people's communication security in an open and complex network environment, so it has attracted many experts and scholars to carry out in-depth research in this field. The design of authentication protocol often wants to be more efficient and more secure. The security authentication protocol based on Chebyshev multinomial has higher computational efficiency than the traditional security authentication protocol based on RSA or Elliptic Curve Cryptography. In recent years, There are more and more research results in this field. In this paper, the anonymous authentication protocol based on Chebyshev multinomial is studied. After briefly reviewing the protocol of Zhu, we point out five problems in its protocol: the existence of user impersonation attack, which can not provide user anonymity, the vulnerability to offline dictionary attack, and the low efficiency of password change scheme. There are defects in the login phase design. Then, based on the Zhu protocol, we propose a new authentication protocol based on Chebyshev multinomial, which is better in security performance and computational efficiency, and can resist all common attacks. We continue to propose a tripartite authentication protocol based on Chebyshev multinomial, which can still provide anonymity and join a trusted third party, so that the protocol can be applied to a larger network environment. The main contents of this paper are as follows: in the first chapter, the research background and present situation of security protocol based on Chebyshev Polynomials are introduced. The second chapter introduces some basic concepts and theories that will be used in the following chapters. In chapter 3, the security protocol based on Chebyshev multinomial proposed by Zhu is reviewed and its security defects are analyzed. In the fourth chapter, based on the protocol proposed by Zhu, an improved protocol is proposed, and the security analysis is carried out, and the formal proof of BAN logic is carried out. Finally, the performance of the protocol is compared with that of other related protocols. In chapter 5, a tripartite authentication protocol based on Chebyshev multinomial is proposed, and the security analysis and formal security proof are carried out. finally, the performance of the protocol is compared with that of other related protocols. The sixth chapter summarizes the full text and research prospects.
【學(xué)位授予單位】:武漢大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP393.08
【相似文獻】
相關(guān)期刊論文 前10條
1 王中德;;兩類新的切比雪夫多項式[J];北京郵電學(xué)院學(xué)報;1989年02期
2 易念學(xué),卜斌龍;切比雪夫最佳分布系數(shù)的簡捷計算方法[J];中國空間科學(xué)技術(shù);1992年03期
3 顧樂民;;預(yù)測型切比雪夫多項式[J];計算機工程與應(yīng)用;2012年07期
4 李建瀛,尹應(yīng)增,,劉其中;切比雪夫多項式系數(shù)特性及其在天線綜合中的應(yīng)用[J];電波科學(xué)學(xué)報;1995年Z1期
5 倪海東;陳義;;切比雪夫多項式擬合方法在車輛導(dǎo)航應(yīng)用中的研究[J];全球定位系統(tǒng);2009年06期
6 史麗萍,孫寶元,于浩洋;切比雪夫多項式回歸分析方法在測量數(shù)據(jù)處理中的應(yīng)用[J];黑龍江大學(xué)自然科學(xué)學(xué)報;2003年02期
7 劉曉剛;吳曉平;田顏鋒;鄧禹;;利用切比雪夫多項式模型進行時間預(yù)報的研究[J];大地測量與地球動力學(xué);2010年01期
8 肖蒙;李軍;;切比雪夫多項式及其插值法在檢測中的應(yīng)用研究[J];自動化與儀器儀表;2006年03期
9 馮宇,宋建平,錢興中;切比雪夫多項式系數(shù)特性及其在阻抗變換器中應(yīng)用[J];信息工程大學(xué)學(xué)報;2005年04期
10 趙金偉;馮博琴;閆桂榮;;泛化的統(tǒng)一切比雪夫多項式核函數(shù)[J];西安交通大學(xué)學(xué)報;2012年08期
相關(guān)會議論文 前2條
1 王建奇;王行愚;;利用切比雪夫多項式求解時滯系統(tǒng)的無窮時間線性二次型反饋控制律[A];1989年控制理論及其應(yīng)用年會論文集(中)[C];1989年
2 曹文濤;郭際明;;基于切比雪夫多項式的GPS軌道標(biāo)準(zhǔn)化方法[A];第三屆中國衛(wèi)星導(dǎo)航學(xué)術(shù)年會電子文集——S08衛(wèi)星導(dǎo)航模型與方法[C];2012年
相關(guān)博士學(xué)位論文 前1條
1 李揚;關(guān)于斐波那契多項式與切比雪夫多項式的一些恒等式[D];西北大學(xué);2015年
相關(guān)碩士學(xué)位論文 前2條
1 童彤;基于切比雪夫多項式的匿名認證協(xié)議設(shè)計與研究[D];武漢大學(xué);2017年
2 孔圓圓;動態(tài)性狀基因位點定位的方法研究[D];黑龍江大學(xué);2014年
本文編號:2480060
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2480060.html