English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4238339      Online Users : 378
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/3863


    Title: 結合智慧卡與指紋辨識的身分碼認證機制之安全性研究
    Other Titles: On the Security of ID-based Password Authentication Scheme using Smart Cards and Fingerprints
    Authors: 林姿秀
    Lin, Tri-Show
    Contributors: 林祝興
    Lin, Chu-Hsin
    東海大學資訊工程學系碩士在職專班
    Keywords: 使用者認證;指紋辨識;智慧卡;通關密碼;資料預算攻擊
    ID-based scheme;fingerprint;biometrics;smart card;data compromise
    Date: 2005
    Issue Date: 2011-05-12T05:45:13Z (UTC)
    Abstract: 結合生物資訊及智慧卡的技術以應用於遠端使用者的認證架構是越來越普遍,在2003年Kim,Lee和Yoo(KLY)提出了一個以指紋辨識為基礎,結合ID(使用者身份碼認證)與智慧卡來確保遠端認證安全。雖然如此,他們所提出的架構仍舊存在著安全上的弱點,以致於無法抵擋資料破解攻擊及重送攻擊。在本篇論文中,我們將分析KLY等人的架構,指出其安全上的瑕疵,我們針對資料破解攻擊及重送攻擊方法提出攻擊的演算法
    In 2003 ( ACM Operating Systems Review, Vol.37), Kim, Lee and Yoo [1] proposed an ID-based password authentication scheme for log-on to a remote server using smart card, password and fingerprint. In this paper, we show that the KLY protocol is vulnerable to an active adversary who can extract some information embedded in the smart card by using existing smart cards attack methods. By getting the information and eavesdropping the previous login messages of a legal user, an attacker without any password or fingerprint can successfully forge the legal user to obtain services from the system. In this case, the protocol is not sufficient for systems with high level security requirements. We point out a cryptanalysis of KLY scheme and propose a data compromise attack algorithm and replay attack algorithm.We also hope that the benefit of the science and technique can improve the security of the remote user authentication.
    Appears in Collections:[資訊工程學系碩士在職專班] 碩士論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML715View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback