电信科学 ›› 2016, Vol. 32 ›› Issue (5): 114-120.doi: 10.11959/j.issn.1000-0801.2016144

• 研究与开发 • 上一篇    下一篇

椭圆曲线加密结合散列函数的移动网络匿名安全认证方案

陈跃辉1,黄淼2   

  1. 1 内江职业技术学院,四川 内江641000
    2 平顶山学院软件学院,河南 平顶山 467000
  • 出版日期:2017-02-22 发布日期:2017-02-22

Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network

Yuehui CHEN1,Miao HUANG2   

  1. 1 Neijiang Vocational and Technical College,Neijiang 641000,China
    2 School of Software,Pingdingshan University,Pingdingshan 467000,China
  • Online:2017-02-22 Published:2017-02-22

摘要:

为了防止私人数据泄露并完善已有的移动网络匿名漫游认证方案,提出了一种利用椭圆曲线加密结合散列函数的移动网络匿名安全认证方案。该方案利用椭圆曲线加密,结合散列函数,以随机数代替公开密钥加密和时间戳。首先,使用外地代理(FA)的漫游服务之前,计算单向散列函数,移动用户(MU)使用本地代理(HA)注册。然后,建立认证和会话的密钥,采用椭圆曲线加密,若HA一直待在同一FA中,则MU可以用FA更新会话密钥。最后,MU通过公共信道,利用HA修改密码。性能和安全性分析表明,相比其他几种类似方案,提出的方案明显提高了效率和安全性。其中,虚拟计算时间只有2.000 85 s,显著降低了计算开销。

关键词: 移动网络, 匿名安全认证, 椭圆曲线加密, 散列函数, 假冒攻击

Abstract:

In order to prevent personal data from being lacked and improve the existing mobile network roaming anonymous authentication scheme,anonymous security authentication scheme using elliptic curve cryptography and hash functions in mobile network was proposed.With elliptic curve cryptography and hash functions,random numbers were used to replace public key encryption and time stamp.Firstly,before using the roaming services of a foreign agent(FA),hash function was calculated.A host agent(HA)was used by mobile user to register.Then,authentication and session key were set up with elliptic curve encryption.If HA is always in FA,MU can update the session key with FA.Finally,through a common channel,MU could utilize HA to change their passwords.The analysis of the performance and safety shows that,compared with other similar programs,the proposed scheme has significantly improved efficiency and safety.And the virtual computing time is only 2.000 85 seconds,which sharply reduces the cost of computing.

Key words: mobile network, anonymous security authentication, elliptic curve cryptography, hash function, impersonation attack

No Suggested Reading articles found!