期刊文献+

一种新的会话密钥协商算法 被引量:1

A novel session key agreement algorithm
下载PDF
导出
摘要 对Chebyshev多项式的定义进行了扩展,形成了有限域ZP上的Chebyshev多项式.利用有限域上Chebyshev多项式的单向性和半群特性,构造了一种新的会话密钥协商算法.该算法具有会话密钥协商的公平性.与Diffie-Hellman算法相比,该算法的运行无需寻找有限域中的本原元,只需选用普通的整数即可,且算法的破译更为复杂.对算法的安全性进行了分析,指出任何在实数域上具有半群特性的代数多项式都可用来构造会话密钥协商算法. After expanding the definition of Chebyshev polynomials, the Chebyshev polynomials on finite fields Zp are formed. Using their one-way and semi-group properties on the finite fields, a novel session key agreement algorithm is presented. The algorithm has the fairness of the session key agreement. Compared with Diffie-Hellman algorithm, the algorithm does not need to look for primitive element in running, but select common integer number. And the attack to the algorithm is more complex. Finally, the security of the session key agreement algorithm is analyzed and it is concluded that any polynomials, which have semi-group property on real fields, can be used to construct session key agreement algorithm.
出处 《高技术通讯》 CAS CSCD 北大核心 2005年第11期13-16,共4页 Chinese High Technology Letters
基金 新材料领域项目,中国科学院资助项目
关键词 会话密钥协商 CHEBYSHEV多项式 有限域 session key agreement, Chebyshev polynomials, finite fields
  • 相关文献

参考文献5

  • 1Diffie W, Hellman M E. New directions in cryptography. Information Theory, IEEE, 1976, 22(6): 644 被引量:1
  • 2Shannon C E. Communication theory of secrecy systems. Bell Systems Technical Journal, 1949, 28(4): 656 被引量:1
  • 3Kocarev L, Tasev Z. Public-key encryption based on Chebyshev maps. In: IEEE Circuits & Syst Ssoc. The 2003 IEEE International Symposium on Circuits and Systems. New York:IEEE, 2003. 28-31 被引量:1
  • 4Pina Bergamo, Paolo D'Arco, Alfredo De Santis, et al. Security of public key cryptosystems based on Chebyshev polynomials [ EB/OL]. http://citebase. eprints. org, 2004 被引量:1
  • 5Cetin Kaya Koc. High-speed RSA implementation [ EB/OL].ftp://ftp. rsasecurity. com/pub/pdfs/tr201. pdf, 1994. 13-14 被引量:1

同被引文献11

  • 1LAMPORT L. Password authentication with inse- cure communication [ J ]. Communication of the ACM, 1981, 24(11): 770-722. 被引量:1
  • 2Smart N. An ID -based Authenticated Key A- greement Protocol Based on the Weil Pairing[ J]. IEE Electronics Letters, 2002, 38 ( 13 ) : 630 - 632. 被引量:1
  • 3Kocarev L, Tasev Z. Public- key encryption based on Chebyshev maps. ISCAS 2003, 2003, 3:28-31. 被引量:1
  • 4Xiao D, Liao X F, Deng S J. A novel key agree- ment protocol based on chaotic maps. Information sciences, 2007, 177 (4) : 1136 - 1142. 被引量:1
  • 5Pina Bergamo, Paolo D' Aroc,Alfredo De Santis etc. Security of Public Key Cryptosystems based on Chebyshev Polynomials [ J ]. IEEE Transac- tions on Circuits and Systems, 2005, 7,52 (7) : 1382 - 139. 被引量:1
  • 6Matheswara Rao Valluri. Blind Signature Scheme based on Chebyshev Polynomials [ A ]. Internation Journal of Network Security&Its Application ( IJN- SA), Vol. 3, No. 6, Novermber 2011: 173 - 183. 被引量:1
  • 7Xiao D, Liao X, Deng S. A novel key agreement protocol based on chaotic maps [ J ]. Inform Sci 2007,177(4) :1136 - 1142. 被引量:1
  • 8廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用[H].北京:科学出版社,2009:157-161. 被引量:1
  • 9Han S. Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fract 2008,38(3). 764 -768. 被引量:1
  • 10郝舒欣.基于混沌的公钥密码的身份的认证的研究[ID].2011. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部