首页 | 本学科首页   官方微博 | 高级检索  
     

抗重放攻击认证协议的设计原则和方法研究
引用本文:王正才,杨世平.抗重放攻击认证协议的设计原则和方法研究[J].计算机工程与设计,2008,29(20).
作者姓名:王正才  杨世平
作者单位:1. 贵州大学计算机科学与技术学院,贵州贵阳,550025
2. 贵州大学计算机科学与技术学院,贵州贵阳,550025;贵州大学明德学院,贵州贵阳,550004
摘    要:重放攻击是最基本、最常用、危害性最大的攻击认证协议的形式.从服务器和通信实体的角度对认证协议受重放攻击的根源进行详细的分析,提出了一套抗重放攻击认证协议的设计原则和方法.通过该原则和方法,对Adadi-Needham修改版本的Otway-Rees协议和BAN-Yahalom协议进行了分析和改进.该设计原则和方法对抗重放攻击认证协议的设计和分析是很有效的.

关 键 词:认证协议  重放攻击  会话密钥  形式化分析  认证协议设计

Research on principles and methods of designing authentication protocols against replay attack
WANG Zheng-cai,YANG Shi-ping.Research on principles and methods of designing authentication protocols against replay attack[J].Computer Engineering and Design,2008,29(20).
Authors:WANG Zheng-cai  YANG Shi-ping
Affiliation:WANG Zheng-cai1,YANG Shi-ping1,2(1.College of Computer Science , Technology,Guizhou University,Guiyang 550025,China,2.Mingde College,Guiyang 550004,China)
Abstract:Replay attack is the most basic,dangerous and frequently used form of attacking authentication protocols.The radical causes of replay attack from the perspectives of server and entities of authentication protocol are analyzed and a set of principles and methods of designing authentication against the replay attack are put forward.The Adadi-Needham revised version of the Otway-Rees protocol and BAN-Yahalom protocol are analyzed and improved by using these principles and methods.The designing principles and m...
Keywords:authentication protocols  replay attack  session key  formal analysis  authentication protocols design  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号