[1]王小冬,周海燕.基于LECC和MD5算法的网络身份认证[J].南京师范大学学报(工程技术版),2015,15(04):053.
 Wang Xiaodong,Zhou Haiyan.Authentication in Networking Environment Based onLECC and MD5 Algorithm[J].Journal of Nanjing Normal University(Engineering and Technology),2015,15(04):053.
点击复制

基于LECC和MD5算法的网络身份认证
分享到:

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
15卷
期数:
2015年04期
页码:
053
栏目:
计算机工程
出版日期:
2015-12-20

文章信息/Info

Title:
Authentication in Networking Environment Based onLECC and MD5 Algorithm
作者:
王小冬1周海燕2
(1.南京工程学院计算机工程学院,江苏 南京 211167)
(2.南京师范大学数学科学学院,江苏 南京 210023)
Author(s):
Wang Xiaodong1Zhou Haiyan2
(1.School of Computer Engineering,Nanjing Institute of Technology,Nanjing 211167,China)
(2.School of Mathematical Sciences,Nanjing Normal University,Nanjing 210023,China)
关键词:
MD5算法线性纠错码远程身份认证
Keywords:
MD5 algorithmlinear error correcting codedistanced-identity authentication
分类号:
TP301.6
文献标志码:
A
摘要:
MD5算法常用于对远程用户进行身份认证,但其抵挡不了查字典或差分攻击. 本文对用户身份进行MD5加密后,再采用LECC对密文进行纠错编码,提高算法抵御防攻击的能力. 理论和实践证明,本算法具有较高的安全性和实用价值.
Abstract:
MD5 algorithm is commonly used in authentication for the remote user,but it cannot resist the dictionary or differential attack. This paper improves an ability of the algorithm to resist against the attack by MD5 encryption for user identity and LECC ciphertext with error correction coding. Theory and practice have proved that this method is of high security and practical value.

参考文献/References:

[1] 柏银,李志蜀,朱兴东,等. MD5算法及其在远程身份认证中的应用[J]. 四川大学学报(自然科学版),2006,43(2):305-309.
BAI Y,LI Z S,ZHU X D. MD5 algorithm and the application in distanced-identity authentication[J]. Journal of Sichuan university(natural science edition),2006,43(2):305-309.(in Chinese)
[2] WANG X Y. How to break MD5 and other hash functions[J]. Lecture notes in computer science,2005,3 494:19-35.
[3] 毛熠,陈娜. MD5算法的研究与改进[J]. 计算机工程,2012(24):111-114.
MAO Y,CHEN N. Research and improvement of MD5 algorithm[J]. Computer engineering,2012(24):111-114.(in Chinese)
[4] LIU F B,LIU Y,XIE T,et al. Fast password recovery attack:application to APOP[J]. Journal of intelligent manufacturing,2014,25(2):251-261.
[5] WANG L,OHTA K,SASAKI Y,et al. Cryptanalysis of two MD5-based authentication protocols:APOP and NMAC[J]. IEICE transactions on information and systems,2010,E93/D(5):1 087-1 095.
[6] 周林,曾伟,徐良华. MD5差分攻击算法在FPGA上的实现技术[J]. 保密科学技术,2012(4):69-73.
ZHOU L,ZENG W,XU L H. Implementation technology of MD5 differential attack algorithm on FPGA[J]. Secrecy science and technology,2012(4):69-73.(in Chinese)
[7] WANG X M. Digital signature scheme based on error-correcting codes[J]. IEEE electronics letters,1990,26(13):898-899.
[8] WANG X M. Modification of the digital signature scheme based on error-correcting codes[J]. Acta electronica sinica,2000,28(2):110-112.
[9] 钱建发. 纠错码理论及应用研究[D]. 西安:西安电子科技大学,2010.
QIAN J F. Research on theory and application of error-correcting codes[D]. Xi’an:Xidian University,2010.(in Chinese)
[10] 冯克勤. 纠错码的代数理论[M]. 北京:清华大学出版社,2005.
FENG K Q. Algebraic theory of error-correcting codes[M]. Beijing:Tsinghua University Press,2005.(in Chinese)

备注/Memo

备注/Memo:
收稿日期:2015-07-02. 
基金项目:江苏省教育厅自然科学研究面上项目(13KJB110016). 
通讯联系人:王小冬,实验师,研究方向:数据挖掘与模式识别. E-mail:wangxd@njit.edu.cn
更新日期/Last Update: 2015-12-20