A Study on Security Authentication Protocols Using a Mobile Device Connection as a Second Authentication Channel

碩士 === 國立雲林科技大學 === 電機工程系碩士班 === 99 === Accessing web services on the network, we first need to login our account in order to obtain the services provided by the server. If you use a public computer, we have no way to securely login online services, because this computer may be infected by a Trojan...

Full description

Bibliographic Details
Main Authors: Ren-hao Liao, 廖仁豪
Other Authors: Young-long Chen
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/75824122218045942530
Description
Summary:碩士 === 國立雲林科技大學 === 電機工程系碩士班 === 99 === Accessing web services on the network, we first need to login our account in order to obtain the services provided by the server. If you use a public computer, we have no way to securely login online services, because this computer may be infected by a Trojan or the network may link to other unsafe network nodes. When network packets go through a network node, someone may block the packets and the contents of the packets may be analyzed, so the network connection and its environment are unsafe. Using a multi-channel authentication protocol can improve the unsafe connection to a safe connection for an authentication process. This is because we may use the mobile devices we carry to connect the Internet as a certification of the second connection channel. Our mobile devices may connect networks by 3G or a Wi-Fi network. However, using a multi-channel authentication protocol does not consider the identity of the user and there are too many messages to be sent by mobile devices. These messages can be collected and cracked. In this thesis, an authentication protocol called Authentication protocol l is first proposed. In Authentication Protocol 1, the messages sent by mobile devices use the exclusive operation to reduce the number of messages and achieve the effect of encryption. Next, Authentication Protocol 2 is proposed. In Authentication Protocol 2, in addition to the messages sent by mobile devices using the exclusive operation, user''s password is used to confirm the identity of the user. Finally, Authentication Protocol 3 is proposed. In Authentication Protocol 3, we add a user account and use the exclusive operation for four messages. We combine the four messages, which must be sent by mobile device to authentication server, into one message to reduce the number of messages. Furthermore, in order to avoid the message to be cracked, the exclusive operation is replaced by the AES algorithm in our three authentication protocols. AES algorithm is a symmetric encryption that is difficult to crack. The message sent by the mobile device and going through the encryption of AES algorithm is safe. In addition, we use our proposed authentication protocols to solve the issues generated when we login the online-game in an unsafe network. Experiment results show that our three authentication protocols are fast and safe in wireless networks.