A Network Identity Authentication Protocol Based on Fingerprint and Probabilistic Encryption of RSA

Article Preview

Abstract:

Security transaction problem between the client and the server was solved by a network identity authentication protocol of this paper. We designed this protocol from two aspects, one is the hardware structure design, and the other is data encryption. We used fingerprint sensor to gather the user’s fingerprint and characteristic value instead of password input from keyboard, and used RSA probabilistic encryption to generate public key and private key of the client and public key and private key of the server, and then used the protocol certification process to finish operation of the data encryption and decryption. This protocol guarantees every specific legitimate user rights and prevents the hacker from attacking network data, and the practical application shows this protocol is absolutely safe.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2471-2474

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhu Li-juan, Design and Implementation of Network Identity Authentication Protocol Based on Fingerprint Identification and Mixed Encryption, Manufacturing Information Engineering of China. 40 (2011) 120-122.

Google Scholar

[2] S.Goldwasser, S.Micali, Probabilistic encryption, Journal of Computer and System Sciences. 28(1984) 270-299.

DOI: 10.1016/0022-0000(84)90070-9

Google Scholar

[3] Huiping Lian, Mingfu Yang, A Probabilistic Encryption Scheme Based on RSA and Its Application, Computer Engineering of China. 27(2001) 139–140.

Google Scholar

[4] Qing Wang, Fenhe Zhi, The Design and Implementation of Identity Authentication Protocol in Mobile Commerce, Journal of Beijing Union University(Natural Sciences). 24(2010) 12-16.

Google Scholar