An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography

碩士 === 大葉大學 === 資訊工程學系碩士班 === 102 === As the rapid rise of internet, internet information systems have developed from Mainframe-Terminal to Client and Client-Server and then to Peer-To-Peer (P2P). As the progressively advance of cloud computing and internet technique every year, information system...

Full description

Bibliographic Details
Main Authors: Jing-Yi Yang, 楊靖苡
Other Authors: Andy S. Chiou
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/68801393950713795080
id ndltd-TW-102DYU00392015
record_format oai_dc
spelling ndltd-TW-102DYU003920152015-10-13T23:38:24Z http://ndltd.ncl.edu.tw/handle/68801393950713795080 An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography 基於橢圓曲線加密機制下的改良式遠端登入認證協定 Jing-Yi Yang 楊靖苡 碩士 大葉大學 資訊工程學系碩士班 102 As the rapid rise of internet, internet information systems have developed from Mainframe-Terminal to Client and Client-Server and then to Peer-To-Peer (P2P). As the progressively advance of cloud computing and internet technique every year, information systems can store a large number of calculations or data on remote servers in the form of Client and Client-Server. Relatively, how to make sure the security of data on internet transmission has become an important issue. For example, how to prevent others from intercepting passwords arbitrarily by password-logger and from misusing account number to transfer error message. Only most of businessmen action connect to the internet can they log in terminal host from remote host through e-commerce products action to make data calculation and transmission to achieve real-time and convenience, which therefore exposes the importance of the security of data transmissions. In terms of remote login authentication mechanism, the earliest scholars reach it by the XOR operation. Then the subsequent development of various techniques like the elliptic curve cryptography, the exclusive recognition and chip cards both supported by biologic character, which provide a store of important information, have integrated themselves to remote login authentication mechanism and increased security of data transmission at remote login . Base on the concept of elliptic curve cryptography, biometric hash function and public-key, the paper intends to propose a security mechanism for password authentication applied to remote login. Only the lower operating cost can the elliptic curve cryptography operations assure safety in conformity with conventional encryption mechanism. Then if we operate the user's biometric (e.g., fingerprint and so on) with biometric hash function, the intruder cannot get the user's true biometric. And the operated biometrics store in account and password of different servers accordingly so as to reduce the exposure risk of user’s information after the invasion of account and password stored in single server, and to improve security of remote login mechanism. Andy S. Chiou 邱紹豐 2014 學位論文 ; thesis 52 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大葉大學 === 資訊工程學系碩士班 === 102 === As the rapid rise of internet, internet information systems have developed from Mainframe-Terminal to Client and Client-Server and then to Peer-To-Peer (P2P). As the progressively advance of cloud computing and internet technique every year, information systems can store a large number of calculations or data on remote servers in the form of Client and Client-Server. Relatively, how to make sure the security of data on internet transmission has become an important issue. For example, how to prevent others from intercepting passwords arbitrarily by password-logger and from misusing account number to transfer error message. Only most of businessmen action connect to the internet can they log in terminal host from remote host through e-commerce products action to make data calculation and transmission to achieve real-time and convenience, which therefore exposes the importance of the security of data transmissions. In terms of remote login authentication mechanism, the earliest scholars reach it by the XOR operation. Then the subsequent development of various techniques like the elliptic curve cryptography, the exclusive recognition and chip cards both supported by biologic character, which provide a store of important information, have integrated themselves to remote login authentication mechanism and increased security of data transmission at remote login . Base on the concept of elliptic curve cryptography, biometric hash function and public-key, the paper intends to propose a security mechanism for password authentication applied to remote login. Only the lower operating cost can the elliptic curve cryptography operations assure safety in conformity with conventional encryption mechanism. Then if we operate the user's biometric (e.g., fingerprint and so on) with biometric hash function, the intruder cannot get the user's true biometric. And the operated biometrics store in account and password of different servers accordingly so as to reduce the exposure risk of user’s information after the invasion of account and password stored in single server, and to improve security of remote login mechanism.
author2 Andy S. Chiou
author_facet Andy S. Chiou
Jing-Yi Yang
楊靖苡
author Jing-Yi Yang
楊靖苡
spellingShingle Jing-Yi Yang
楊靖苡
An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography
author_sort Jing-Yi Yang
title An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography
title_short An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography
title_full An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography
title_fullStr An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography
title_full_unstemmed An Improved Remote Login and Authentication Scheme based on Elliptic Curve Cryptography
title_sort improved remote login and authentication scheme based on elliptic curve cryptography
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/68801393950713795080
work_keys_str_mv AT jingyiyang animprovedremoteloginandauthenticationschemebasedonellipticcurvecryptography
AT yángjìngyǐ animprovedremoteloginandauthenticationschemebasedonellipticcurvecryptography
AT jingyiyang jīyútuǒyuánqūxiànjiāmìjīzhìxiàdegǎiliángshìyuǎnduāndēngrùrènzhèngxiédìng
AT yángjìngyǐ jīyútuǒyuánqūxiànjiāmìjīzhìxiàdegǎiliángshìyuǎnduāndēngrùrènzhèngxiédìng
AT jingyiyang improvedremoteloginandauthenticationschemebasedonellipticcurvecryptography
AT yángjìngyǐ improvedremoteloginandauthenticationschemebasedonellipticcurvecryptography
_version_ 1718086401188167680