期刊文献+

可安全抵抗中间攻击的认证密钥交换

Authenticated Key Exchange Scheme for Secure Against the Man-in-the-Middle Attack
下载PDF
导出
摘要 提出一种基于身份认证的密钥交换新方案,其安全性是同时基于离散对数和大整数分解难问题的。在进行密钥交换时,该方案能同时实现通信双方的身份认证和交换密钥的一致性认证,有效地抵抗冒名者的中间攻击和入侵者的重放攻击,提高了密钥交换的安全性和可靠性。特别是,该方案的交换密钥具有随机性,克服了Diffie-Hellman方案中交换密钥固定不变的弱点;通信双方一旦发现当前交换密钥泄露,可生成一个新的交换密钥,而不需修改系统的任何公开数据和用户的密钥。 We present a new scheme for authenticated key exchange,the security of which is based on both discrete logarithm and big integer factorization.This scheme can implement identity authentication and key verification for both participants when key exchanging,which can effectively withstand the man-in-the-middle attack and the replay attack from intruders and enhance the security and reliability of key exchange.Especially,this scheme creates keys at random,hence overcomes the defect that the key is invariable in Diffie-Hellman algorithm,the participants can generate a new key once they find the current key is leaked out in no need of changing any public data or private key.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第2期133-135,共3页 Computer Engineering and Applications
基金 国家自然科学基金项目(编号:60173038) 广东省自然科学基金(编号:010421 000759)资助
关键词 密钥交换 身份认证 大整数分解 离散对数 key exchange,identity authentication,integer factorization,discrete logarithm
  • 相关文献

参考文献9

  • 1范红.互联网密钥交换协议及其安全性分析[J].软件学报,2003,14(3):600-605. 被引量:14
  • 2Bresson E,Chevassut O,Pointcheval D.Security proofs for an efficient password-based key exchange[C].In:Proceedings of the 10th ACM Conference on Computer and Communication Security,Wanshington, DC, USA ,2003:27-30. 被引量:1
  • 3Bresson E,Chevassut O,Pointcheval D.New security results on encrypted key exchange[C].In:Proceedings of the International Workshop on Practice and Theory in Public Key Cryptography(PKC),2004-03-1-4. 被引量:1
  • 4Johnston A M,Gemmell P S.Authenticated key exchange provably secure against the Man-in-the-Middle attack[J].Journal of Cryptology ,2002 ; 15:139-148. 被引量:1
  • 5Bresson E,ChevassutO,Pointcheval D.Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions[C].In:Proceedings of Eurocrypt'2002, Amsterdam, Netherlands, 2002-04-28—05-2 : 321-336. 被引量:1
  • 6Bresson E,ChevassutO,Pointeheval D et al.Provably authenticated group Diffie-Hellman key exchange[C].In:Proceedings of the 8th ACM Conference on Computer and Communications Security,Philadelphia, Pennsylvania, USA, 2001 - 11-6-8 : 255-264. 被引量:1
  • 7Bellare M,Pointcheval D,Rogaway P.Authenticated key exchange secure against dictionary attacks[C].In:Proceeding of EUROCRYPT2000, Brugge, Belgium, 2000-05 : 138-155. 被引量:1
  • 8R Rivest,A Shamir,L Adleman.A Method for Abtainting Digital Signatures and Public Key Cryptosystem[J].Commum of the ACM,1978;21 (2) : 120-126. 被引量:1
  • 9W Diffie,M Hellman.New Directions in Cryptography[J].IEEE Trans on Information Theory, 1976;IT-22(6) :644-654. 被引量:1

二级参考文献4

  • 1[1]Meadows C. Analyzing formal methods to the analysis of a key management protocol. Journal of Computer Security-ESORICS 96, Springer-Verlag, 1996. 365~384. 被引量:1
  • 2[2]Borella MS, Grabelsky JLD, Montenegro G. Realm specific IP: framework. Internet Draft draft-ietf-nat-rsip-framework-03.txt, 1999. 被引量:1
  • 3[3]Harkins D, Carrel D. The Internet key exchange (IKE). Internet RFC 2409, 1998. 被引量:1
  • 4[4]Meadows C. Analysis of the Internet key exchange protocol using the NRL protocol analyzer. In: Proceedings of the 1999 Symposium on Security and Privacy. IEEE Computer Society Press, 1999. 287~305. 被引量:1

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部