首页 | 本学科首页   官方微博 | 高级检索  
     

身份认证的密钥交换算法
引用本文:李亚敏,李小鹏,吴果.身份认证的密钥交换算法[J].计算机工程,2006,32(12):171-172.
作者姓名:李亚敏  李小鹏  吴果
作者单位:解放军信息工程大学电子技术学院,郑州,450004
摘    要:密钥交换是通信双方建立会话密钥的过程,Diffie—Hellman协议是一种有代表性的算法,但是这种算法不能够抵抗中间人攻击。为了抵抗中间人攻击,陆续出现了几种具有身份认证功能的算法,但是这些算法运算比较复杂。Seo等提出了一种简单的算法(SAKA),可以抵抗中间人攻击,并且运算简单。但是SAKA以及其的增强算法均有缺陷,该文提出了一种改进算法,在具有原有协议优点的同时可以避免这些缺陷。

关 键 词:密钥协商  认证  中间人攻击
文章编号:1000-3428(2006)12-0171-02
收稿时间:08 10 2005 12:00AM
修稿时间:2005-08-10

Authenticated Key Exchange Algorithm
LI Yamin,LI Xiaopeng,WU Guo.Authenticated Key Exchange Algorithm[J].Computer Engineering,2006,32(12):171-172.
Authors:LI Yamin  LI Xiaopeng  WU Guo
Affiliation:Institute of Electronic Technology, PLA University of Information Engineering, Zhengzhou 450004
Abstract:Key agreement is the procedure that the two sides of the communication negotiate a session key.Diffie-Hellman key agreement protocol is well known,but this protocol can not resist man-in-the-middle(MID) attack.Several protocols that can escape MID attack have been proposed.Those protocols are complicated.A simple authenticated key agreement algorithm(SAKA) and its enhanced protocols are developed.They are very simple,but some weaknesses are founded.A new protocol based on SAKA is proposed in this paper,which can make up these weaknesses.
Keywords:Key agreement  Authentication  Man-in-the-middle attack
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号