期刊文献+

身份认证的密钥交换算法 被引量:8

Authenticated Key Exchange Algorithm
下载PDF
导出
摘要 密钥交换是通信双方建立会话密钥的过程,Diffie-Hellman协议是一种有代表性的算法,但是这种算法不能够抵抗中间人攻击。为了抵抗中间人攻击,陆续出现了几种具有身份认证功能的算法,但是这些算法运算比较复杂。Seo等提出了一种简单的算法(SAKA),可以抵抗中间人攻击,并且运算简单。但是SAKA以及其的增强算法均有缺陷,该文提出了一种改进算法,在具有原有协议优点的同时可以避免这些缺陷。 Key agreement is the procedure that the two sides of the communication negotiate a session key. Diffie-Hellman key agreement protocol is well known, but this protocol can not resist man-in-the-middle(MID) attack. Several protocols that can escape MID attack have been proposed. Those protocols are complicated. A simple authenticated key agreement algorithm (SAKA) and its enhanced protocols are developed. They are very simple, but some weaknesses are founded. A new protocol based on SAKA is proposed in this paper, which can make up these weaknesses.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第12期171-172,共2页 Computer Engineering
关键词 密钥协商 认证 中间人攻击 Key agreement Authentication Man-in-the-middle attack
  • 相关文献

参考文献4

  • 1Diffie W,Hellman M.New Directions in Cryptography[J].IEEE Trans.on Information Theory,1976,IT-22 (6):644-654. 被引量:1
  • 2Seo D,Sweeney P.Simple Authenticated Key Agreement Algorithm[J].Electronics Letters,1999,35(13):1073-1074. 被引量:1
  • 3Sun H.On the Security of Simple Authenticated Key Agreement Algorithm[C].Proceedings of the Management Theory Workshop,2000 被引量:1
  • 4Lin I C,Chang C C,Hwang M S.Security Enhancement for the Simple Authentication Key Agreement Algorithm[C].24^th Ann.Int.Computer Software and Application Conf.,2000:113-115. 被引量:1

同被引文献50

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部