首页 | 本学科首页   官方微博 | 高级检索  
     

基于圆锥曲线密码的密钥协商协议
引用本文:闫鸿滨,刘鹤霄.基于圆锥曲线密码的密钥协商协议[J].微计算机信息,2012(5):148-149,181.
作者姓名:闫鸿滨  刘鹤霄
作者单位:南通职业大学电子工程系;黑龙江大学经济与工商管理学院
基金项目:基金项申请人:何明星;项目名称:基于时间特性的密钥容侵管理;基金颁发部门:国家自然科学基金委(60773035);项目名称:可信传输密钥管理协议研究;基金颁发部门:四川省人事厅(08226056)
摘    要:密钥管理问题是网络安全问题中的关键问题,密钥管理是处理密钥自产生到最终销毁的整个过程中的有关问题,涉及密钥的产生、存储、分配、使用和销毁等一系列重要技术,其中密钥存储和分配是最重要的技术。文章重点研究了密钥协商技术,并基于圆锥曲线密码体制提出一种可认证密钥协商协议,协议安全性依赖于圆锥曲线离散对数难题。该协议提供身份认证、密钥确认、完关前向安全性,并能够防止中间人攻击。

关 键 词:密钥管理  圆锥曲线密码  密钥交换  身份认证

Key agreement protocol based on the conic curve cryptography
YAN Hong-bin,LIU He-xiao.Key agreement protocol based on the conic curve cryptography[J].Control & Automation,2012(5):148-149,181.
Authors:YAN Hong-bin  LIU He-xiao
Affiliation:(Department of electron, Nantong Vocational University Nantong 226007, China) (School of Economics and Business Administration, Heilongjiang University, Harbin 150080, China)
Abstract:Key management is the core problem of network system security, which deals with the correlative problems from key being generated to ultimately destroyed; it includes system initialization, key generation, key encasement, key distribution, key storage, key renovation, key destruction, etc. In which, the critical problem is key storage and key destruction. Key distribution technology is researched in this paper. A new key distribution protocol, based on the public-key cryptography of conic curve, was proposed, in which the security relied on the conic curve discrete logarithm problem. The protocol can provide identity authentication, key validation, perfect forward secrecy, and foil man-in-the-middle attacks.
Keywords:Key management  cryptography of conic curve  key exchange  identity authentication  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号