{"title":"基于混沌的密码认证系统的设计与实现","authors":"Nan Jiang, Ri-jing Yang, Xiang-dong Liu","doi":"10.1109/IWCFTA.2009.50","DOIUrl":null,"url":null,"abstract":"This paper proposed the construction algorithm of chaotic Hash function based on Hénon-like mapping, and designed one password authentication scheme on basis of chaotic scramble sort algorithm and chaotic Hash function; it also resolved the insecurity problems that can’t resist little numbers attack, the iteration times of plaintext transmission and the attack of fraud server in the scheme. It finally implemented the one time password authentication system based on chaotic scramble sort table and chaotic Hash function.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The Design and Implementation of Password Authentication System Based on Chaos\",\"authors\":\"Nan Jiang, Ri-jing Yang, Xiang-dong Liu\",\"doi\":\"10.1109/IWCFTA.2009.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposed the construction algorithm of chaotic Hash function based on Hénon-like mapping, and designed one password authentication scheme on basis of chaotic scramble sort algorithm and chaotic Hash function; it also resolved the insecurity problems that can’t resist little numbers attack, the iteration times of plaintext transmission and the attack of fraud server in the scheme. It finally implemented the one time password authentication system based on chaotic scramble sort table and chaotic Hash function.\",\"PeriodicalId\":279256,\"journal\":{\"name\":\"2009 International Workshop on Chaos-Fractals Theories and Applications\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Workshop on Chaos-Fractals Theories and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCFTA.2009.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Workshop on Chaos-Fractals Theories and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCFTA.2009.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Design and Implementation of Password Authentication System Based on Chaos
This paper proposed the construction algorithm of chaotic Hash function based on Hénon-like mapping, and designed one password authentication scheme on basis of chaotic scramble sort algorithm and chaotic Hash function; it also resolved the insecurity problems that can’t resist little numbers attack, the iteration times of plaintext transmission and the attack of fraud server in the scheme. It finally implemented the one time password authentication system based on chaotic scramble sort table and chaotic Hash function.