An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography

碩士 === 大葉大學 === 資訊工程學系碩士班 === 102 === As the rapid rise of internet, internet information systems have developed from Mainframe-Terminal to Client and Client-Server and then to Peer-To-Peer (P2P). As the progressively advance of cloud computing and internet technique every year, information system...

Full description

Bibliographic Details
Main Authors: Jing-Yi Yang, 楊靖苡
Other Authors: Andy S. Chiou
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/68801393950713795080
Description
Summary:碩士 === 大葉大學 === 資訊工程學系碩士班 === 102 === As the rapid rise of internet, internet information systems have developed from Mainframe-Terminal to Client and Client-Server and then to Peer-To-Peer (P2P). As the progressively advance of cloud computing and internet technique every year, information systems can store a large number of calculations or data on remote servers in the form of Client and Client-Server. Relatively, how to make sure the security of data on internet transmission has become an important issue. For example, how to prevent others from intercepting passwords arbitrarily by password-logger and from misusing account number to transfer error message. Only most of businessmen action connect to the internet can they log in terminal host from remote host through e-commerce products action to make data calculation and transmission to achieve real-time and convenience, which therefore exposes the importance of the security of data transmissions. In terms of remote login authentication mechanism, the earliest scholars reach it by the XOR operation. Then the subsequent development of various techniques like the elliptic curve cryptography, the exclusive recognition and chip cards both supported by biologic character, which provide a store of important information, have integrated themselves to remote login authentication mechanism and increased security of data transmission at remote login . Base on the concept of elliptic curve cryptography, biometric hash function and public-key, the paper intends to propose a security mechanism for password authentication applied to remote login. Only the lower operating cost can the elliptic curve cryptography operations assure safety in conformity with conventional encryption mechanism. Then if we operate the user's biometric (e.g., fingerprint and so on) with biometric hash function, the intruder cannot get the user's true biometric. And the operated biometrics store in account and password of different servers accordingly so as to reduce the exposure risk of user’s information after the invasion of account and password stored in single server, and to improve security of remote login mechanism.