Similar documents
21 Key Exchange method for portable terminal with direct input by user

Web Basic Web SAS-2 Web SAS-2 i

25 About what prevent spoofing of misusing a session information

Web Web Web Web i

LAN LAN LAN LAN LAN LAN,, i

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

( )

i

7,, i

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

Web Web ID Web 16 Web Web i

特集_03-07.Q3C

21 VoIP An encrypted VoIP communication system for mobile telephones

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

YMS-VPN1_User_Manual

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

°Å¹æµ»½Ñ¤Î¿ôÍý¤È¤·¤¯¤ß --- ¥á¡¼¥ë¤Ç¤¸¤ã¤ó¤±¤ó¡©¤¹¤ëÊýË¡ ---

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

soturon.dvi

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights

/07/ /10/12 I

PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i

21 e-learning Development of Real-time Learner Detection System for e-learning

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [

P2P P2P Winny 3 P2P P2P 1 P2P, i

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

P2P P2P peer peer P2P peer P2P peer P2P i

,,.,,., II,,,.,,.,.,,,.,,,.,, II i

paper.dvi


DTN DTN DTN DTN i

..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i

58 10

IT i

untitled

, i

AirMac ネットワーク構成の手引き

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

22 Google Trends Estimation of Stock Dealing Timing using Google Trends

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

28 Horizontal angle correction using straight line detection in an equirectangular image

29 jjencode JavaScript

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

C02.pdf

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

AirMac ネットワーク for Windows

Web Web Web Web Web, i

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

(Visual Secret Sharing Scheme) VSSS VSSS 3 i

卒業論文2.dvi

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

WMN Wi-Fi MBCR i

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C

IT,, i

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

rzamhpdf.ps

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

29 Short-time prediction of time series data for binary option trade

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

,,,,., C Java,,.,,.,., ,,.,, i

19 Systematization of Problem Solving Strategy in High School Mathematics for Improving Metacognitive Ability

ATR-01-D

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple


1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325

2 ( ) i

kut-paper-template.dvi

, IT.,.,..,.. i

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i

2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11

fiš„v5.dvi

16_.....E...._.I.v2006

IW2002-B5 1 Internet Week ( ) 9:30 12:30 ( ) Copyright 2002 All Rights Reserved, by Seiji Kumagai ADSL FTTH 24 IP LAN

(1) i NGO ii (2) 112

28 TCG SURF Card recognition using SURF in TCG play video

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

Si-R180 ご利用にあたって

日本内科学会雑誌第98巻第4号

日本内科学会雑誌第97巻第7号


finalrep.dvi

Sobel Canny i

08-特集04.indd

system02.dvi

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

IPSJ SIG Technical Report Vol.2012-IS-119 No /3/ Web A Multi-story e-picture Book with the Degree-of-interest Extraction Function

4.1 % 7.5 %

結婚生活を強める

Web-ATMによる店舗向けトータルATMサービス

1

<95DB8C9288E397C389C88A E696E6462>

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

II

農研機構 食品総合研究所 研究報告 77号

Transcription:

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3

SAS-X Web ID/ ID/ Web SAS-2 SAS-X i

Abstract Proposal of Multi Device Authenticable Password Management System using SAS-X Shingo WATANABE In recent years, with the increase of Web services, ID / password pairs managed by individuals are increasing.for this reason, the password management system is proposed. Also, in addition to ID / password, a one-time password authentication method that improve safety by using disposable passwords has been proposed, too.in the password management system method combining these, it is necessary to secure a safe route at the time of initial registration, and it is not possible to perform authentication with a plurality of terminals.in this research, we point out the problems of existing systems and propose password management system to solve them. key words Password Management System Web service one-time password SAS- 2 SAS-X Multi Device Authentication iii

1 1 1.1..................................... 1 1.2................................ 4 2 7 2.1...................... 7 2.2.................... 8 2.2.1................................. 8 2.2.2 SSL.................................. 8 2.3........................... 10 3 11 3.1.......................... 12 3.2...................... 12 4 SAS 15 4.1 SAS-2............................... 15 4.1.1.............................. 15 4.1.2 SAS-2........................... 16 4.1.3 SAS-2............ 18 4.1.4 SAS-2............................. 19 4.2 SAS-X............................... 20 4.2.1.............................. 20 4.2.2 SAS-X.......................... 20 4.2.3 SAS-X..................... 23 v

5 25 5.1............................... 25 5.2.................................. 26 5.3.............................. 26 5.4................................ 27 5.4.1.............................. 27 5.4.2 i............................... 27 5.5.............................. 28 5.6..................................... 29 5.6.1......................... 29 5.6.2......................... 30 5.6.3................................ 30 5.6.4....................... 30 5.6.5........................... 31 5.6.6......................... 31 5.6.7.................................. 33 6 35 37 39 vi

1.1 Web........................... 2 1.2 1 ID/............ 3 1.3 ID/...................... 3 1.4..................... 4 2.1 SSL................................. 9 4.1 SAS-2:............................. 16 4.2 SAS-2:............................. 18 4.3 SAS-X:............................. 21 4.4 SAS-X:............................. 22 5.1 SAS-X:........................... 27 5.2 SAS-X:i........................... 28 5.3..................... 33 vii

5.1.......................... 29 5.2.................................... 32 5.3 [ms]............................... 32 ix

1 1.1 Web Web Web SNS(Social Networking Service) Web 1.1 ID/ [1] Web 16 ID/ 16 ID/ Web ID/ Web ID/ Web 1.2 5 ID/ 1

1 ID/ 5 [1] 1.3 ID/ 3 5 [1] ID/ ID/ 1.4 PC [2] Wi-Fi ID/ ID/ 1.1 Web 1 ID/ ID/ 2

1.1 1.2 1 ID/ 1.3 ID/ 1 ID/ ID/ 3

1 1.4 SSL(Secure Sokets Layer) 2 ID/ SSL [3] SAS-2(Simple And Secure password authentication protocol, ver.2)[4] [3] 1.2 2 4

1.2 3 4 SAS 5 5

2 2.1 ID/ ID/ ID/ 3 SSL SSL SAS-2 SAS-2 7

2 SSL 2.2 SAS-2 4 2.2.1 DES[5] AES[6] FEAL[7] Diffie-Hellman[8] RSA[9] 2.2.2 SSL SSL TCP/IP 8

2.2 SSL SSL 2.1 SSL 2.1 SSL 1. 2. 3. 4. 5. 6. 7. 8. 9

2 2.3 SAS-2 SSL 2 SAS-2 2 SAS-2 10

3 ID ID/ x H y = H(x) y x x H y MD5[10] SHA-1[11] ROPEMD-160[12] 11

3 3.1 3.2 1 [13] [14] SAS 12

3.2 M SAS SAS 2 3 4 SAS 13

4 SAS SAS SAS-2 SAS-X(Simple And Secure password authentication protocol, extra-secure) 2 SAS-2 SAS-X 4.1 SAS-2 4.1.1 User Server User ID S X F H H(x) x E E(x, k) x k 15

4 SAS 4.1 SAS-2: D D(x, k) x k i N i i + 4.1.2 SAS-2 SAS-2 2 SAS-2 4.1 SAS-2 1. ID S N 0 ID S N 0 16

4.1 SAS-2 A = X(ID, S N 0 ) 2. ID A 3. ID A SAS-2 4.2 i SAS-2 1. ID S N i A = X(ID, S N i ) N i+1 C = X(ID, S N i+1 ) F (C) = F (ID, C) C F (C) N i+1 α = C (F (C) + A) β = F (C) A 2. ID α β 3. β A F (C) = β A C = α (F (C) + A) F (C) F (ID, C) 4. A C γ = H(ID, F (C)) 5. γ 6. H(ID, F (C)) γ 17

4 SAS 4.2 SAS-2: 4.1.3 SAS-2 SAS-2 SAS-2 (i + 1) 18

4.1 SAS-2 α E (F (E) + C) β F (E) C ID α x (F (x) + C) β F (x) C ID i SAS-2 4.1.4 SAS-2 SAS-2 A = X(ID, S N 0 ) A C = X(ID, S N 1 ) α C (F (C) + A) β F (C) A α x (F (x) + A) 19

4 SAS β F (x) A 4.2 SAS-X 4.2.1 User Server User ID S X F H H(x) x i N i i 4.2.2 SAS-X SAS-X 2 SAS-X 4.3 SAS-X 20

4.2 SAS-X 4.3 SAS-X: 1. ID S N 0 S N 0 A = X(S N 0 ) 2. A = X(A) ID A 3. ID A SAS-X 4.4 i SAS-X 1. ID S N i A = X(S N i ) N i+1 C = X(ID, S N i+1 ) C = X(C) C A N i+1 21

4 SAS 4.4 SAS-X: α = C X(A) β = C A 2. ID α β 3. α A C = α A F (A) = F (β C) F (A) A 4. A C γ = H(F (A)) 5. γ 6. H(A) γ 22

4.2 SAS-X 4.2.3 SAS-X SAS-X X(A) = X(S N 0 ) A X(A) C = X(X(S N i )) α C X(A) β C A ID α x X(A) β x A ID i SAS-X 23

5 4 SAS-X SAS-X 5.1 SAS-X SSL 3 25

5 5.2 User Server User A B ID M P ass M ID G GroupID A C G GSA SI X F H H(x) x i N i i + 5.3 5.1 1. ID M P ass M N 1 P ass M N 0 A = X(P ass M N 0 ) 2. A = X(A) 3. ID M A 26

5.4 5.1 SAS-X: 5.4 5.4.1 SAS-X SI A ID G G = (A ID G ) 5.4.2 i i 5.2 i 1. 2. G 3. P ass M N i A = X(P ass M N i ) N i+1 C = X(X(P ass M N i+1 )) 4. = C X(A) = C A GSA = G SI X(A) ID M GSA 27

5 5.2 SAS-X:i 5. X(A) = GSA SI G C = X(A) A = C 6. X(A) F(A) 7. G = G (F (A)) C = H(F (A)) SI 8. H(A) SI 5.5 A B ID M P ass M A 28

5.6 SI G = G A SI SI B 5.6 SAS-2 SAS-X 5.1 5.1 2 4 2 4 5 2 5.6.1 29

5 4 SAS-X 5.6.2 5.6.3 ID M 2 2 2 4 5.6.4 4 2 6 5 2 7 SAS-X SAS-2 30

5.6 5.6.5 4 SAS-X i + 1 α C X(A) β C A ID M GS A α x X(A) β x A ID M GS A i 5.6.6 5.2 100 31

5 5.2 ASUS Nexus7 Qualcomm Snapdragon S4 Pro APQ8064 1.5GHz Mac OS X Inter Core i7 3GHz 5.3 5.3 5.3 [ms] 1 2 3 4 5 241 342 349 354 368 352 241ms 1 342ms 2 349ms 3 354ms 4 368ms 5 352ms 26ms 10 100 5.3 32

5.6 5.3 5.6.7 1 1 1 33

6 ID/ SAS-X 1 1 35

37

[1] http://www.jp.websecurity.symantec.com/welcome/pdf/password management survey.pdf Feb 2 2017 [2] http://www.soumu.go.jp/johotsusintokei/field/tsuushin01.html Feb 2 2017 [3] 2015 [4] T. Tsuji, A.Shimizu, A one-time password authentication method for low spec machines and on internet protocols, IEICE Trans.Commun., vol.e87-b, no.6, pp.1594-1600, 2004. [5] U.S. Dept. of Commerce, FIPS PUB 46-3, Data Encryption Standard (DES), October 1999. [6] NIST, FIPS PUB 197 Advanced Encryption Standard (AES), November 2001. [7],, FEAL,, Vol.J70-D, No. 7, pp.1413-1423, 1987. [8] M. Bellare and P. Rogaway, Optimal Asymmetric Encryption, EURO- CRYPTO 94, LNCS 950, pp. 92-111, Springer-Verlag, 1995. [9] R. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital sig- natures and public-key cryptosystems, Commun. of the ACM, Vol. 21, No.2, pp. 120-126, February 1978. [10] R. Rivest, The MD5 message-digest algorithm, Internet Request For Comments 1321, April 1992. 39

[11] National Institute of Standards and Technology, Secure hash standard, FIPS Publication 180-1, April 1995. [12] W. Stallings, Secure hash algorithm, in Cryptography and Network Security: Principles and Practice Second Edition, pp.193-197, Prentice-Hall, 1999. [13],,, 8-246733, 1996-9-24. [14],,, 7-274258, 1995-10-20. 40