Research on Dynamic Identity Authentication Mechanism Based on Digital Signature

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the economic development of globalization, the widespread Internet and the continuous establishment of national informatization, information security has become the focus of the national security guarantee system. Identity authentication is the first line of defense of the network communication system and the network security portal. Cryptography is the core content of the information security system and is widely used in various applications such as network security and data security. As the cornerstone of network security, since passwords are easy to be stolen or lost, it is not safe to authenticate identity with static passwords alone. Therefore, dynamic identity authentication came into being. It effectively resists the main security threats and attacks faced by static password authentication, solves the main drawbacks of static password authentication technology, and effectively prevents replay attacks. In addition, dynamic identity authentication solves the problem of static passwords being stolen in the database or stolen during transmission, thereby preventing illegal users from intruding and accessing the system. This article first studies the principle of digital signature technology and the design idea of dynamic identity authentication, and combines the advantages of both to propose a new dynamic identity authentication system based on digital signature technology.

Cite

CITATION STYLE

APA

Zhan, W., & Ye, X. (2020). Research on Dynamic Identity Authentication Mechanism Based on Digital Signature. In Journal of Physics: Conference Series (Vol. 1693). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1693/1/012009

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free