期刊文献+

面向高安全数据分发服务的身份认证协议设计 被引量:4

Design of Authentication Protocol for High-security Data Distribution Service
下载PDF
导出
摘要 为解决数据分发服务安全规范中身份认证与密钥协商协议存在共享密钥建立缺乏公平性、缺乏验证密钥一致性机制及会话过程缺乏完整性等安全问题,以协议为基础,设计一种新的高安全数据分发服务身份认证与密钥协商协议。新协议引入了ACK机制,并利用D-H密钥交换和非对称密码体制特点解决了原协议存在的安全问题,具备实用性和更高的安全性。 Authentication and shared secret establishment protocol of Data Distribution Service Security Specification has some security problems,such as lack of fairness in shared secret establishment,lack of mechanism to validate the consistency of secret key,and lack of integrity in the whole session. Based on this protocol,we design a new protocol named authentication protocol for high- security data distribution service. The new protocol introduces ACK mechanism,which solves above problems by using the new mechanism and features of D- H key exchange and asymmetric cryptography,and it' s a more secure and practical protocol.
出处 《航空计算技术》 2015年第1期103-107,共5页 Aeronautical Computing Technique
基金 中航工业技术创新基金项目资助(2013D63125R)
关键词 数据分发服务 协议安全性 身份认证 密钥协商 D-H密钥交换 data distribution service security of protocol authentication shared secret establishment D-H key exchange
  • 相关文献

参考文献8

二级参考文献12

  • 1沈鑫剡,俞海英,伍红兵,胡勇强.802.11i EAP-TLS认证机制[J].电子技术(上海),2007,34(7):79-81. 被引量:1
  • 2Li Gong. Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]. Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, 1990:234-248. 被引量:1
  • 3van Oorschot P V. Extending Cryptographic Logics of Belief to Key Agreement Protocols[C]. Proceedings of the 1^st ACM Conference on Communications and Computer Security, 1993-11: 3-5. 被引量:1
  • 4Butty an L, Staamann S, Wilhelm U. A Simple Logic for Authentication Protocol Design[C]. 11^th IEEE Computer Security Foundations Workshop, Rockport, MA, USA, 1998-06: 9-11. 被引量:1
  • 5Treek D, Blazie B J. A Formal Language for Security Services Base Modelling and Analysis[J]. Computer Networks, 1995, 18(12): 921. 被引量:1
  • 6Abadi M, Needham R. Prudent Engineering Practicc for Cryptographic Protocols[C]. Proceedings of the IEEE Computer Society Symposiom on Research in Security and Privacy, 1994:122-136. 被引量:1
  • 7Datta A, Derek A, Mitchell J C, et al. A Derivation System for Security Protocols and Its Logical Foundatlon[C]. 16^th IEEE Computer Security Foundations Workshop, 2003:109-125. 被引量:1
  • 8IBM.Internet Application Development with MQSeries and Java[M].Palos Verdes:Vervante Corporate Publishing,1997. 被引量:1
  • 9OMG.Data Distribution Service for Real-time Systems Specification[Z].2004. 被引量:1
  • 10OMG.The Common Object Request Broker:Architecture and Specification[Z].2002. 被引量:1

共引文献41

同被引文献16

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部