首页 | 本学科首页   官方微博 | 高级检索  
     

Needham-Schroeder私钥协议的改进
引用本文:缪祥华,何大可.Needham-Schroeder私钥协议的改进[J].计算机工程,2006,32(17):32-34.
作者姓名:缪祥华  何大可
作者单位:1. 西南交通大学计算机与通信工程学院,成都,610031
2. 西南交通大学信息安全与国家计算网格实验室,成都,610031
摘    要:研究了Needham-Schroeder私钥协议,指出了该协议存在的缺陷和漏洞,并给出了一种攻击该协议方法。虽然Needham和Schroeder对原始的协议进行了修改,但修改后的协议仍然存在缺陷。还有其他一些学者也对该协议进行了修改,但是仍然不令人满意。针对原始协议存在的缺陷和漏洞,该文进行了相应的修改,并用BAN逻辑来分析了修改后的协议,说明修改后的协议能够达到协议的目标。

关 键 词:协议分析  BAN逻辑  Needham-Schroeder私钥协议
文章编号:1000-3428(2006)17-0032-03
收稿时间:09 27 2005 12:00AM
修稿时间:2005-09-27

Improvement of Needham-Schroeder Protocol with Shared Keys
MIAO Xianghua,HE Dake.Improvement of Needham-Schroeder Protocol with Shared Keys[J].Computer Engineering,2006,32(17):32-34.
Authors:MIAO Xianghua  HE Dake
Affiliation:1. School of Computer and Communication Engineering, Southwest Jiaotong University, Chengdu 610031 ; 2. Laboratory of Information Security and National Computing Grid, Southwest Jiaotong University, Chengdu 610031
Abstract:This paper researches on Needham-Schroeder protocol with shared keys. It points out bugs and leaks that the protocol exists, and provids a kind of method to attack the protocol. Needham and Schroeder have revised the primitive protocol, but the amended protocol still has a leak. Some other scholars have revised this protocol too, but the amended protocol still is unsatisfactory. In allusion to bugs and leaks existing to the primitive protocol, the paper carries on corresponding modification, and analyses the amended protocol with BAN logic. It indicates that the amended protocol can reach the goal of the protocol.
Keywords:Protocol analysis  BAN logic  Needham-Schroeder protocol with shared keys  
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号