CN103678975A - Identity authentication simulation system based on chaotic system - Google Patents

Identity authentication simulation system based on chaotic system Download PDF

Info

Publication number
CN103678975A
CN103678975A CN201310720278.1A CN201310720278A CN103678975A CN 103678975 A CN103678975 A CN 103678975A CN 201310720278 A CN201310720278 A CN 201310720278A CN 103678975 A CN103678975 A CN 103678975A
Authority
CN
China
Prior art keywords
module
key value
sequence
chaos
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310720278.1A
Other languages
Chinese (zh)
Other versions
CN103678975B (en
Inventor
于万波
周洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN201310720278.1A priority Critical patent/CN103678975B/en
Publication of CN103678975A publication Critical patent/CN103678975A/en
Application granted granted Critical
Publication of CN103678975B publication Critical patent/CN103678975B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an identity authentication simulation system based on a chaotic system. The identity authentication simulation system comprises a chaotic system simulation module, a sequence performance analyzing module, a key value binding module, a logging-in module, an unlocking module and a display module, wherein the chaotic system simulation module is used for utilizing the chaotic system to set a chaotic original value and iteration time, the sequence performance analyzing module is used for selecting a sequence generating algorithm to generate a sequence and carrying out the performance analysis according to the generated sequence, the key value binding module is used for selecting a key value to be bound and inputting personal information to achieve binding step by step, the logging-in module is used for selecting the bound key value, inputting a correct recognition code for logging-in and achieving the logging-in process step by step, the unlocking module is used for unlocking locked key values, and the display module is used for displaying a simulation image and data and information of modules. The identity authentication is achieved.

Description

Authentication analogue system based on chaos system
Technical field
The present invention relates to electricity field, relate in particular to the authentication analogue system based on chaos system.
Background technology
At present, the authentication of authentication analogue system is often incorrect, to authentication, has brought difficulty.
Summary of the invention
The present invention is directed to the proposition of above problem, and the authentication analogue system based on chaos system proposing has solved the inaccurate of identity authorization system.
Authentication analogue system based on chaos system, is characterized in that, comprising: chaos system emulation module, for utilizing chaos system, arranges chaos initial value and iteration time.
Sequence performance analysis module, for Selective sequence generating algorithm, formation sequence, and according to the sequence generating, carry out performance evaluation;
Key value binding module, for the key value of selecting to bind, input personal information, substep is realized binding;
Login module, for the key value of selecting to have bound, inputs correct identification code and logins, and login process realizes step by step;
Separate lock module, for the key value of locking is carried out to release;
Display module, for showing analogous diagram and modules data and information.
Above-mentioned chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially scale-of-two XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
Above-mentioned key value binding module, specifically for user profile and key value are bound, user binds after key value, sets user's oneself identification code, and user relies on identification code game server, access services device.
Effect of the present invention: by system of the present invention, realized authentication.
Accompanying drawing explanation
Technical scheme for clearer explanation embodiments of the invention or prior art, by the accompanying drawing of required use in embodiment or description of the Prior Art being done to one, introduce simply below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
A kind of Chaos Simulation that Fig. 1 provides for the embodiment of the present invention and the structural drawing of identity authorization system;
The interface schematic diagram of a kind of chaos system emulation module that Fig. 2 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of sequence performance analysis module that Fig. 3 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of key value binding module that Fig. 4 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of login module that Fig. 5 provides for the embodiment of the present invention;
A kind of interface schematic diagram of separating lock module that Fig. 6 provides for the embodiment of the present invention;
The interface schematic diagram of a kind of display module that Fig. 7 provides for the embodiment of the present invention.
Embodiment
For making object, technical scheme and the advantage of embodiments of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is known to complete description:
As shown in Figure 1, the embodiment of the present invention provides Chaos Simulation and identity authorization system, comprising:
Chaos system emulation module 1, for chaos initial value and iteration time are arranged, and selects x axle and the y axle will carry out emulation.
Sequence performance analysis module 2, for selecting the algorithm of the sequence of generation, carries out performance evaluation.
Key value binding module 3, for the USbkey that selects to bind, input personal information, substep is realized binding.
Login module 4, for the USbkey that selects to have bound, inputs correct PIN code and logins, and login process realizes step by step.
Separate lock module 5, for the USbkey of locking is carried out to release.
Display module 6, for showing some general datas and the information of analogous diagram and each step of modules.
Wherein, when simulation realizes identity authorization system, in system, can preset 5 USbkey, in these 5 USbkey, to preset hyperchaotic system starting condition, these starting condition are the Back ground Informations that carry out userspersonal information's encryption and realization " one-time pad " ID authentication mechanism, are can not be disclosed.
Introduce in detail respectively above-mentioned modules below,
In chaos system emulation module 1, the chaos initial value of input can reset, and exceeds after certain limit, just cannot enter chaos system.Iteration time can oneself arrange, and iteration time is larger, and it is more that acquisition discrete counted, and the point of the chaos sequence analogous diagram of acquisition will be more intensive.
This chaos system emulation module 1, as shown in Figure 2, can select to want the plane of emulation by x axle and drop-down menu corresponding to y axle.Click " carrying out emulation " button, system can be determined the sequential value that will show according to the selective value of two drop-down menus, then in display module, shows simulation result.
Be illustrated in figure 3 chaos sequence performance evaluation module, chaos sequence performance evaluation module is mainly that a sequence is carried out to statistical study, need to carry out Frequency statistics and distance of swimming statistics to sequence, and draw autocorrelator trace according to sequence, result is presented in the middle of display module.
Be illustrated in figure 4 USbkey binding system module, this module is used for realizing userspersonal information binds with USbkey, and in USbkey, inserts initial master key and seed key, stores corresponding user profile in server simultaneously, and seed key information.
The process of USB key value binding is as follows:
1, information conversion, first determines whether to have inserted USbkey, if after determining insertion USbkey, the personal user information of input is converted to binary matrix.
Read the selective value v of USBkey key value, judge whether selective value v equals 6, if be greater than 6, read input data, these data are character type, character type is converted into corresponding binary code, and character type binary code is converted into double type binary code, then by this double type binary code.
2, random series, random generation is used for the binary matrix of encrypting user personal information, and the initial value of hyperchaotic system used is provided by USbkey inside.
Read chaos system starting condition, iteration is obtained initial chaos sequence, according to scale-of-two XOR algorithm and initial chaos sequence, generates Hyperchaotic Sequence.Then reading information matrix size, and intercept corresponding scrambled matrix.
3, to encrypt, the secret matrix with producing in previous step, is encrypted the information of changing, and only carries out XOR.
4, server deciphering, server is generating a matrix according to the method that generates scrambled matrix, carries out an XOR deciphering with the information matrix after encrypting, and whether the information of authorization information input is correct, if correctly carry out next step binding.
5, binding, USbkey recording user personal information scrambled matrix, server record userspersonal information original matrix, and produce the master key logging in for the first time.Specific implementation process flow diagram as shown in Figure 7.
Read chaos starting condition, obtain chaos initiation sequence, obtain distance of swimming statistical series, obtain the random starting point of intercepting, convert binary code sequence to, obtain PIN code matrix size, intercepting is for generating the matrix of key, XOR generates seed key, then data is deposited in USBkey and server.
Except user profile, master key and seed key being deposited in the middle of USbkey, also need to arrange a k, this k value is used for recording the number of times that PIN code is inputed by mistake, and when inputing three times by mistake, USbkey wants locking, so the initial value of k is 3.
As shown in Figure 5, the interface of login system module, for analog subscriber login system.Login process comprises: identification PIN, random series, computing, checking and key information are reset.
1, identification PIN, reads selected USbkey information and PIN code, carries out PIN code checking, if PIN is correct, carries out next step, if mistake cannot be carried out next step.Need to be by USbkey locking in the time of PIN input error three times, after locking, this USbkey cannot complete login.
2, random series, server reads the seed key that USbkey is used for generating chaos sequence, and the method for employing generates chaos sequence identical that produces master key with binding in binding module in button.But this button, after generating ciphering sequence, be recorded last class value of chaos iteration result, as the starting condition of login next time.Meanwhile, also to utilize last value of the Run-Length Coding obtaining in secondary coding algorithm, calculate the next chaos iteration time.
3, computing, the chaos sequence generating in previous step and PIN code homography carry out XOR generation for the master key of authentication.
4, checking, verifies master key, if correct, produce new chaos starting condition and generates the master key of next authentication.Except obtaining new master key, also to be encrypted iteration time, form and encrypt time matrix.
5, key information is reset, seed key information and master key information in update server and USbkey.
As shown in Figure 6, separate lock module, separate lock module and be the USbkey of locking is processed, by userspersonal information is verified, complete release.This process is: information conversion, information extraction, deciphering and four step process of checking.
1, information conversion, changes the userspersonal information of input, converts corresponding binary matrix to, and for ensuing release is prepared, " the information conversion " in its flow process and binding module is basically identical.Whether different is will will determine this USbkey locking according to the k value of storing in USbkey by this button before release.
2, information extraction, according to the selective value in USBkey drop-down menu, extracts userspersonal information's scrambled matrix of preserving in USbkey.
3, deciphering, is decrypted the userspersonal information's scrambled matrix extracting in previous step.The process of deciphering is consistent with the deciphering flow process in binding procedure.
4, checking, carries out contrast verification to separating the information matrix obtaining in the 1st step of lock module with the deciphering matrix obtaining in the 2nd step, if consistent, release success, if inconsistent, release failure.
Display module as shown in Figure 7, this module has two display sections, left and right, and the left side is analogous diagram viewing area, shows the region of data variation in each process implementation of the right modules.

Claims (3)

1. the authentication analogue system based on chaos system, is characterized in that, comprising: chaos system emulation module, for utilizing chaos system, arranges chaos initial value and iteration time;
Sequence performance analysis module, for Selective sequence generating algorithm, formation sequence, and according to the sequence generating, carry out performance evaluation;
Key value binding module, for the key value of selecting to bind, input personal information, substep is realized binding;
Login module, for the key value of selecting to have bound, inputs correct identification code and logins, and login process realizes step by step;
Separate lock module, for the key value of locking is carried out to release;
Display module, for showing analogous diagram and modules data and information.
2. the authentication analogue system based on chaos system as claimed in claim 1, is characterized in that, described chaos system is CNN hyperchaotic system, and described Sequence Generation Algorithm is specially scale-of-two XOR algorithm, quaternary comparison algorithm and secondary coding algorithm.
3. the authentication analogue system based on chaos system as claimed in claim 1, it is characterized in that, described key value binding module, specifically for user profile and key value are bound, user binds after key value, set user's oneself identification code, user relies on identification code game server, access services device.
CN201310720278.1A 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system Active CN103678975B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310720278.1A CN103678975B (en) 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310720278.1A CN103678975B (en) 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system

Publications (2)

Publication Number Publication Date
CN103678975A true CN103678975A (en) 2014-03-26
CN103678975B CN103678975B (en) 2017-01-04

Family

ID=50316498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310720278.1A Active CN103678975B (en) 2013-12-20 2013-12-20 Identity authentication simulation system based on chaos system

Country Status (1)

Country Link
CN (1) CN103678975B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106165340A (en) * 2014-04-28 2016-11-23 加泽郎 encryption method, program and system
WO2018196634A1 (en) * 2017-04-26 2018-11-01 吉林大学珠海学院 Sequential encryption method based on multiple key stream passwords
CN109829333A (en) * 2019-01-14 2019-05-31 中国科学院信息工程研究所 A kind of key message guard method and system based on OpenID
CN116894261A (en) * 2023-09-11 2023-10-17 山东卓汇智能科技有限公司 Digital hospital electronic medical record intelligent encryption method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179375A (en) * 2006-11-12 2008-05-14 黑龙江大学 Chaos algorithm based network data encryption card
CN102571327A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Method for managing USBKey unlocking secret key intensively and safely
CN103413109A (en) * 2013-08-13 2013-11-27 江西理工大学 Bidirectional authentication method of radio frequency identification system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179375A (en) * 2006-11-12 2008-05-14 黑龙江大学 Chaos algorithm based network data encryption card
CN102571327A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Method for managing USBKey unlocking secret key intensively and safely
CN103413109A (en) * 2013-08-13 2013-11-27 江西理工大学 Bidirectional authentication method of radio frequency identification system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
卢辉斌等: "一种基于超混沌系统的身份认证方案", 《计算机安全》, no. 7, 31 July 2010 (2010-07-31), pages 16 - 19 *
周福才等: "基于混沌理论身份认证的研究", 《东北大学学报(自然科学版)》, vol. 23, no. 8, 31 August 2002 (2002-08-31), pages 730 - 732 *
梁喆等: "融入混沌理论的一种OTP方案研究", 《计算机工程》, vol. 33, no. 7, 15 April 2007 (2007-04-15), pages 160 - 162 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106165340A (en) * 2014-04-28 2016-11-23 加泽郎 encryption method, program and system
CN106165340B (en) * 2014-04-28 2020-06-16 加泽一郎 Encryption method, program, and system
WO2018196634A1 (en) * 2017-04-26 2018-11-01 吉林大学珠海学院 Sequential encryption method based on multiple key stream passwords
CN109829333A (en) * 2019-01-14 2019-05-31 中国科学院信息工程研究所 A kind of key message guard method and system based on OpenID
CN116894261A (en) * 2023-09-11 2023-10-17 山东卓汇智能科技有限公司 Digital hospital electronic medical record intelligent encryption method
CN116894261B (en) * 2023-09-11 2023-12-19 山东卓汇智能科技有限公司 Digital hospital electronic medical record intelligent encryption method

Also Published As

Publication number Publication date
CN103678975B (en) 2017-01-04

Similar Documents

Publication Publication Date Title
US20200387594A1 (en) Graphic Pattern-Based Passcode Generation and Authentication
CN105099712B (en) A kind of data ciphering method based on Dicode verification
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
US20160034682A1 (en) Visual image authentication
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
CN109756500A (en) Anti- quantum calculation https traffic method and system based on multiple unsymmetrical key ponds
CN104200363B (en) A kind of method of payment of the electronic purse system based on encrypting fingerprint
CN108868367B (en) Intelligent lock device
CN103929425B (en) A kind of identity registration, identity authentication method, equipment and system
CN103678975A (en) Identity authentication simulation system based on chaotic system
US11693944B2 (en) Visual image authentication
CN107819571A (en) The generation method and device of private key
CN107111967A (en) Using the visual cryptography of augmented reality with obscuring
US11128453B2 (en) Visual image authentication
CN104134141B (en) E-wallet system payment method based on time synchronization
CN103345703A (en) Banking transaction authentication method and system based on image authentication
CN106817346A (en) Data transmission method and device and electronic equipment
CN110084599A (en) Cipher key processing method, device, equipment and storage medium
CN105897417A (en) Encrypted data input method and encrypted data input device
CN103297391A (en) Graphical dynamic password inputting and verifying method
CN106027461A (en) Secret key use method for cloud authentication platform in identity card authentication system
CN105337742B (en) LFSR file encryption and decryption method based on facial image feature and GPS information
CN106027252A (en) Cloud authentication platform in identity card authentication system
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
CN105872305B (en) A kind of completely separable encryption area image reversible data concealing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant