CN103678975B - Identity authentication simulation system based on chaos system - Google Patents

Identity authentication simulation system based on chaos system Download PDF

Info

Publication number
CN103678975B
CN103678975B CN201310720278.1A CN201310720278A CN103678975B CN 103678975 B CN103678975 B CN 103678975B CN 201310720278 A CN201310720278 A CN 201310720278A CN 103678975 B CN103678975 B CN 103678975B
Authority
CN
China
Prior art keywords
information
usbkey
chaos
key
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310720278.1A
Other languages
Chinese (zh)
Other versions
CN103678975A (en
Inventor
于万波
周洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN201310720278.1A priority Critical patent/CN103678975B/en
Publication of CN103678975A publication Critical patent/CN103678975A/en
Application granted granted Critical
Publication of CN103678975B publication Critical patent/CN103678975B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses identity authentication simulation system based on chaos system, including: chaos system emulation module, it is used for utilizing chaos system, chaos initial value and iteration time are configured;Sequence performance evaluation module, is used for selecting Sequence Generation Algorithm, formation sequence, and according to the sequence generated, carries out performance evaluation;Key value binding module, for selecting key value to be bound, inputs personal information, and substep realizes binding;Login module, for selecting the key value bound, inputs correct identification code and logs in, and login process substep realizes;Unlocked state, for being unlocked the key value of locking;Display module, is used for showing analogous diagram and modules data and information.Achieve authentication.

Description

Identity authentication simulation system based on chaos system
Technical field
The present invention relates to electricity field, particularly relate to identity authentication simulation system based on chaos system.
Background technology
At present, the authentication of identity authentication simulation system is the most incorrect, brings difficulty to authentication.
Summary of the invention
The present invention is directed to the proposition of problem above, and the identity authentication simulation system based on chaos system proposed, solve the inaccurate of identity authorization system.
Identity authentication simulation system based on chaos system, it is characterised in that including: chaos system emulation module, is used for utilizing chaos system, is configured chaos initial value and iteration time.
Sequence performance evaluation module, is used for selecting Sequence Generation Algorithm, formation sequence, and according to the sequence generated, carries out performance evaluation;
Key value binding module, for selecting key value to be bound, inputs personal information, and substep realizes binding;
Login module, for selecting the key value bound, inputs correct identification code and logs in, and login process substep realizes;
Unlocked state, for being unlocked the key value of locking;
Display module, is used for showing analogous diagram and modules data and information.
Above-mentioned chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially binary system XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
Above-mentioned key value binding module, specifically for binding user profile with key value, after user binds key value, sets the identification code of user oneself, and user relies on identification code game server, accesses server.
The effect of the present invention: by the system of the present invention, it is achieved that authentication.
Accompanying drawing explanation
For clearer explanation embodiments of the invention or the technical scheme of prior art, introduce the accompanying drawing used required in embodiment or description of the prior art is done one simply below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
A kind of Chaos Simulation that Fig. 1 provides for the embodiment of the present invention and the structure chart of identity authorization system;
The interface schematic diagram of a kind of chaos system emulation module that Fig. 2 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of sequence performance evaluation module that Fig. 3 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of key value binding module that Fig. 4 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of login module that Fig. 5 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of unlocked state that Fig. 6 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of display module that Fig. 7 provides for the embodiment of the present invention.
Detailed description of the invention
For making the purpose of embodiments of the invention, technical scheme and advantage clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out the most complete description:
As it is shown in figure 1, the embodiment of the present invention provides Chaos Simulation and identity authorization system, including:
Chaos system emulation module 1, for being configured chaos initial value and iteration time, and selects x-axis and the y-axis carrying out emulating.
Sequence performance evaluation module 2, for selecting the algorithm of the sequence generated, carries out performance evaluation.
Key value binding module 3, for selecting USbkey to be bound, inputs personal information, and substep realizes binding.
Login module 4, for selecting the USbkey bound, inputs correct PIN code and logs in, and login process substep realizes.
Unlocked state 5, for being unlocked the USbkey of locking.
Display module 6, for showing some key datas in analogous diagram and each step of modules and information.
Wherein, when simulated implementation identity authorization system, 5 USbkey can be preset in system, hyperchaotic system initial condition to be preset in these 5 USbkey, these initial condition are by userspersonal information's encryption and realize the Back ground Information of " one-time pad " ID authentication mechanism, are can not be disclosed.
Above-mentioned modules is discussed in detail separately below,
In chaos system emulation module 1, the chaos initial value of input can reset, and after certain limit, cannot propagate into chaos system.Iteration time can be arranged with oneself, and iteration time is the biggest, it is thus achieved that discrete count the most, it is thus achieved that the point of chaos sequence analogous diagram will be the most intensive.
This chaos system emulation module 1, as in figure 2 it is shown, can select plane to be emulated by the drop-down menu that x-axis is corresponding with y-axis.Clicking on " emulation " button, system can determine sequential value to be shown according to the selective value of two drop-down menus, then show simulation result in display module.
It is illustrated in figure 3 chaos sequence performance evaluation module, chaos sequence performance evaluation module mainly carries out statistical analysis to a sequence, need sequence carries out Frequency statistics and distance of swimming statistics, and draw autocorrelator trace according to sequence, result is shown in the middle of display module.
Being illustrated in figure 4 USbkey binding system module, this module is used for realizing userspersonal information and binds with USbkey, and inserts initial master key and seed key in USbkey, stores corresponding user profile, and seed key information in the server simultaneously.
The process of USB key value binding is as follows:
1, information is changed, it is first determined whether insert USbkey, if it is determined that after inserting USbkey, the personal user information of input is converted to binary matrix.
Read the selective value v of USBkey key value, judge that whether selective value v is equal to 6, if greater than 6, then read input data, these data are character type, character type is converted into the binary code of correspondence, and character type binary code is converted into double type binary code, then by this double type binary code.
2, random sequence, randomly generate the binary matrix for encrypting userspersonal information, the initial value of hyperchaotic system used is provided by USbkey is internal.
Reading chaos system initial condition, iteration obtains original chaotic sequence, according to binary system XOR algorithm and original chaotic sequence, generates Hyperchaotic Sequence.Then read information matrix size, and intercept the scrambled matrix of correspondence.
3, encryption, with the scrambled matrix produced in previous step, the information changed is encrypted, only carries out XOR.
4, server is deciphered, and server is generating a matrix according to the method generating scrambled matrix, carries out an XOR deciphering with the information matrix after encryption, and the information of checking information input is the most correct, if correct, carries out next step binding.
5, binding, USbkey records userspersonal information's scrambled matrix, server record userspersonal information's original matrix, and produces the master key logged in for the first time.Implement flow chart as shown in Figure 7.
Read chaos initial condition, obtain chaos initiation sequence, obtain distance of swimming statistical series, obtain the random starting point intercepted, it is converted into binary code sequence, obtains PIN code matrix size, intercept the matrix for generating key, XOR generates seed key, then data is deposited in USBkey and server.
Except being deposited in the middle of USbkey by user profile, master key and seed key, in addition it is also necessary to arrange a k, this k value is used for recording the number of times that PIN code is inputed by mistake, and when inputing three times by mistake when, USbkey wants locking, so the initial value of k is 3.
As it is shown in figure 5, the interface of login system module, for analog subscriber login system.Login process includes: identify that PIN, random sequence, computing, checking and key information reset.
1, identify PIN, the USbkey information selected by reading and PIN code, carry out PIN code checking, if PIN is correct, then carries out next step, if mistake, cannot be carried out next step.Needing USbkey locking when PIN input error three times when, after locking, this USbkey cannot complete to log in.
2, random sequence, server reads USbkey and is used for generating the seed key of chaos sequence, and the method for employing produces the identical of the chaos sequence of master key with binding generation in button in binding module.But this button is after generating ciphering sequence, last class value of chaos iteration result be recorded, the initial condition logged in as next time.Meanwhile, last value of the Run-Length Coding obtained in secondary coding algorithm to be utilized, it is calculated the chaos iteration time of next time.
3, computing, the chaos sequence generated in previous step and PIN code homography carry out XOR and produce the master key for authentication.
4, checking, master key is verified, if correctly, produces new chaos initial condition and generate the master key of authentication next time.Except obtaining new master key, also iteration time is encrypted, constitute encryption times matrix.
5, key information resets, and updates the seed key information in server and USbkey and master key information.
As shown in Figure 6, unlocked state, unlocked state is the USbkey process to locking, by verifying userspersonal information, completes to unlock.This process is: information conversion, extraction information, deciphers and verifies four step process.
1, information is changed, and changes the userspersonal information of input, is converted into the binary matrix of correspondence, prepares for ensuing unblock, and its flow process is basically identical with " the information conversion " in binding module.Except for the difference that before unlocking, this USbkey the most locking is determined according to the k value of storage in USbkey by this button.
2, extract information, according to the selective value in USBkey drop-down menu, extract the userspersonal information's scrambled matrix preserved in USbkey.
3, deciphering, the userspersonal information's scrambled matrix extracted in previous step is decrypted.The process of deciphering is consistent with the deciphering flow process in binding procedure.
4, checking, the information matrix obtained in the 1st step of unlocked state is carried out contrast verification with the deciphering matrix obtained in the 2nd step, if unanimously, then unlocks successfully, if inconsistent, then unlock failure.
Display module as shown in Figure 7, this module has two the display parts in left and right, and the left side is analogous diagram viewing area, the region of video data change in the realization of each process of the right modules.

Claims (3)

1. identity authentication simulation system based on chaos system, it is characterised in that including: chaos system emulation module, be used for utilizing chaos system, chaos initial value and iteration time are configured;
Sequence performance evaluation module, is used for selecting Sequence Generation Algorithm, formation sequence, and according to the sequence generated, carries out performance evaluation;
Key value binding module, for selecting key value to be bound, inputs personal information, and substep realizes binding, and inserts initial master key and seed key in USbkey, stores corresponding user profile, and seed key information in the server simultaneously;
Login module, for selecting the key value bound, inputs correct identification code and logs in, and login process substep realizes;
Unlocked state, for being unlocked the key value of locking;
Display module, is used for showing analogous diagram and modules data and information ;
Wherein: the process of USB key value binding is as follows:
Information is changed, and inserts USbkey, the personal user information of input is converted to binary matrix;
Reading the selective value v of USBkey key value, it is determined that selective value v, read input data, these data are character type, character type is converted into the binary code of correspondence, and character type binary code is converted into double type binary code;
Random sequence, randomly generates the binary matrix for encrypting userspersonal information, and the initial value of hyperchaotic system used is provided by USbkey is internal;
Reading chaos system initial condition, iteration obtains original chaotic sequence, according to binary system XOR algorithm and original chaotic sequence, generates Hyperchaotic Sequence, then reads information matrix size, and intercept the scrambled matrix of correspondence;
Encryption, with the scrambled matrix produced in previous step, is encrypted the information changed;
Server is deciphered, and server generates a matrix according to the method generating scrambled matrix, carries out an XOR deciphering with the information matrix after encryption, and the information of checking information input is the most correct, if correct, carries out next step binding;
Binding, USbkey records userspersonal information's scrambled matrix, server record userspersonal information's original matrix, and produces the master key logged in for the first time;
Read chaos initial condition, obtain chaos initiation sequence, obtain distance of swimming statistical series, obtain the random starting point intercepted, it is converted into binary code sequence, obtains PIN code matrix size, intercept the matrix for generating key, XOR generates seed key, then data is deposited in USBkey and server;
User profile, master key and seed key are deposited in the middle of USbkey, also set up one, this value be used for record the number of times that PIN code is inputed by mistake, when inputing three times by mistake when, USbkey wants locking, initial value be 3 。
2. identity authentication simulation system based on chaos system as claimed in claim 1, it is characterised in that described chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially binary system XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
3. identity authentication simulation system based on chaos system as claimed in claim 1, it is characterized in that, described key value binding module, specifically for user profile is bound with key value, after user binds key value, setting the identification code of user oneself, user relies on identification code game server, accesses server;
The login process of login module includes: identify that PIN, random sequence, computing, checking and key information reset;
Identifying PIN, the USbkey information selected by reading and PIN code, carry out PIN code checking, if PIN is correct, then carry out next step, needing USbkey locking when PIN input error three times when, after locking, this USbkey cannot complete to log in;
Random sequence, server reads USbkey and is used for generating the seed key of chaos sequence, and last class value of chaos iteration result is recorded, the initial condition logged in as next time, simultaneously, last value of the Run-Length Coding obtained in secondary coding algorithm to be utilized, is calculated the chaos iteration time of next time;
Computing, the chaos sequence generated in previous step and PIN code homography carry out XOR and produce the master key for authentication;
Checking, verifies master key, if correctly, produces new chaos initial condition and generates the master key of authentication next time, except obtaining new master key, to be also encrypted iteration time, constituting encryption times matrix;
Key information resets, and updates the seed key information in server and USbkey and master key information;
Unlocked state releasing process is: information conversion, extraction information, deciphers and verifies;
Information is changed, and changes the userspersonal information of input, is converted into the binary matrix of correspondence, and its flow process is changed consistent with the described information in binding module, and to determine this USbkey the most locking according to the value of storage in USbkey before unlocking;
Extraction information, according to the selective value in USBkey drop-down menu, extracts the userspersonal information's scrambled matrix preserved in USbkey;
Deciphering, is decrypted the described userspersonal information's scrambled matrix extracted, and the process of deciphering is consistent with the deciphering flow process in binding procedure;
Checking, the information matrix obtaining unlocked state carries out contrast verification with the deciphering matrix obtained, if unanimously, then unlocks successfully, if inconsistent, then unlock failure.
CN201310720278.1A 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system Active CN103678975B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310720278.1A CN103678975B (en) 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310720278.1A CN103678975B (en) 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system

Publications (2)

Publication Number Publication Date
CN103678975A CN103678975A (en) 2014-03-26
CN103678975B true CN103678975B (en) 2017-01-04

Family

ID=50316498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310720278.1A Active CN103678975B (en) 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system

Country Status (1)

Country Link
CN (1) CN103678975B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015166701A1 (en) * 2014-04-28 2015-11-05 一郎 加沢 Encryption method, program, and system
CN106953875A (en) * 2017-04-26 2017-07-14 吉林大学珠海学院 Ordered encryption method based on multi-key cipher stream cipher
CN109829333B (en) * 2019-01-14 2021-01-19 中国科学院信息工程研究所 OpenID-based key information protection method and system
CN116894261B (en) * 2023-09-11 2023-12-19 山东卓汇智能科技有限公司 Digital hospital electronic medical record intelligent encryption method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179375B (en) * 2006-11-12 2012-04-04 黑龙江大学 Chaos algorithm based network data encryption card
CN102571327B (en) * 2010-12-31 2015-04-01 上海格尔软件股份有限公司 Method for managing USBKey unlocking secret key intensively and safely
CN103413109B (en) * 2013-08-13 2016-04-06 江西理工大学 A kind of mutual authentication method of radio frequency identification system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于超混沌系统的身份认证方案;卢辉斌等;《计算机安全》;20100731(第7期);第18页第3节,图5 *
融入混沌理论的一种OTP方案研究;梁喆等;《计算机工程》;20070415;第33卷(第7期);第160-162页 *

Also Published As

Publication number Publication date
CN103678975A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
US10396985B1 (en) Federated identity management based on biometric data
US11599624B2 (en) Graphic pattern-based passcode generation and authentication
CN103778374B (en) The method of trusted terminal, double-channel card, anti-clone's chip, chip finger print and anti-channel attack
CN103200011B (en) A kind of cipher authentication method and device
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
CN103678975B (en) Identity authentication simulation system based on chaos system
CN102567233B (en) Data protection method of USB storage device based on magnetic disc virtual technology
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
US11604867B2 (en) Graphic pattern-based authentication with adjustable challenge level
CN101923619A (en) Password key camouflage system and method
CN105359153A (en) Gesture-based authentication without retained credentialing gestures
WO2014188210A1 (en) User authentication system and method
CN108868367B (en) Intelligent lock device
CN106027461B (en) A kind of method that authentication ids system medium cloud authentication platform uses key
CN104134141B (en) E-wallet system payment method based on time synchronization
CN105897417A (en) Encrypted data input method and encrypted data input device
CN103297391A (en) Graphical dynamic password inputting and verifying method
CN102957688A (en) Password input and verification method and device
CN104881595B (en) The self-help remote unlocking method managed based on PIN code
CN106027252A (en) Cloud authentication platform in identity card authentication system
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
CN102902903B (en) A kind of ecommerce intelligent code key with button and its implementation
CN102685121A (en) Digital signature method and digital signature device
WO2017059696A1 (en) Touch screen unlocking method and system, storage medium
CN105989481B (en) Data interaction method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant