|Table of Contents|

Authentication in Networking Environment Based onLECC and MD5 Algorithm(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2015年04期
Page:
53-
Research Field:
计算机工程
Publishing date:

Info

Title:
Authentication in Networking Environment Based onLECC and MD5 Algorithm
Author(s):
Wang Xiaodong1Zhou Haiyan2
(1.School of Computer Engineering,Nanjing Institute of Technology,Nanjing 211167,China)
(2.School of Mathematical Sciences,Nanjing Normal University,Nanjing 210023,China)
Keywords:
MD5 algorithmlinear error correcting codedistanced-identity authentication
PACS:
TP301.6
DOI:
-
Abstract:
MD5 algorithm is commonly used in authentication for the remote user,but it cannot resist the dictionary or differential attack. This paper improves an ability of the algorithm to resist against the attack by MD5 encryption for user identity and LECC ciphertext with error correction coding. Theory and practice have proved that this method is of high security and practical value.

References:

[1] 柏银,李志蜀,朱兴东,等. MD5算法及其在远程身份认证中的应用[J]. 四川大学学报(自然科学版),2006,43(2):305-309.
BAI Y,LI Z S,ZHU X D. MD5 algorithm and the application in distanced-identity authentication[J]. Journal of Sichuan university(natural science edition),2006,43(2):305-309.(in Chinese)
[2] WANG X Y. How to break MD5 and other hash functions[J]. Lecture notes in computer science,2005,3 494:19-35.
[3] 毛熠,陈娜. MD5算法的研究与改进[J]. 计算机工程,2012(24):111-114.
MAO Y,CHEN N. Research and improvement of MD5 algorithm[J]. Computer engineering,2012(24):111-114.(in Chinese)
[4] LIU F B,LIU Y,XIE T,et al. Fast password recovery attack:application to APOP[J]. Journal of intelligent manufacturing,2014,25(2):251-261.
[5] WANG L,OHTA K,SASAKI Y,et al. Cryptanalysis of two MD5-based authentication protocols:APOP and NMAC[J]. IEICE transactions on information and systems,2010,E93/D(5):1 087-1 095.
[6] 周林,曾伟,徐良华. MD5差分攻击算法在FPGA上的实现技术[J]. 保密科学技术,2012(4):69-73.
ZHOU L,ZENG W,XU L H. Implementation technology of MD5 differential attack algorithm on FPGA[J]. Secrecy science and technology,2012(4):69-73.(in Chinese)
[7] WANG X M. Digital signature scheme based on error-correcting codes[J]. IEEE electronics letters,1990,26(13):898-899.
[8] WANG X M. Modification of the digital signature scheme based on error-correcting codes[J]. Acta electronica sinica,2000,28(2):110-112.
[9] 钱建发. 纠错码理论及应用研究[D]. 西安:西安电子科技大学,2010.
QIAN J F. Research on theory and application of error-correcting codes[D]. Xi’an:Xidian University,2010.(in Chinese)
[10] 冯克勤. 纠错码的代数理论[M]. 北京:清华大学出版社,2005.
FENG K Q. Algebraic theory of error-correcting codes[M]. Beijing:Tsinghua University Press,2005.(in Chinese)

Memo

Memo:
-
Last Update: 2015-12-20