首页 | 本学科首页   官方微博 | 高级检索  
     

基于Oracle模型的可认证加密协议安全性分析
引用本文:薛滨,潘磊,李枫. 基于Oracle模型的可认证加密协议安全性分析[J]. 计算机工程与设计, 2007, 28(10): 2303-2305
作者姓名:薛滨  潘磊  李枫
作者单位:中原工学院,河南,郑州,450007;中原工学院,河南,郑州,450007;中原工学院,河南,郑州,450007
摘    要:密码算法的安全定义研究以及定义间的深入理解已经成为现代密码学的主要研究领域.然而,当前多数可认证加密方案缺乏必要的安全性分析,为了分析协议安全性,在IND-CPA概念基础上,对加密与MAC组合与先MAC后加密两种对称式的可认证加密协议予以分析,并分别用Oracle机方法给出了IND-CPA攻击下的安全性证明.结果表明加密与MAC组合方式不能保证IND-CPA安全,但先MAC后加密方式则可实现IND-CPA安全.

关 键 词:认证加密  选择明文攻击  不可区分性  消息认证  对称密码
文章编号:1000-7024(2007)10-2303-03
修稿时间:2006-05-19

Security analysis of authenticated encryption based on Oracle model
XUE Bin,PAN Lei,LI Feng. Security analysis of authenticated encryption based on Oracle model[J]. Computer Engineering and Design, 2007, 28(10): 2303-2305
Authors:XUE Bin  PAN Lei  LI Feng
Affiliation:Zhongyuan Institute of Technology, Zhengzhou 450007, China
Abstract:The development of precise definitions of security for encryption,as well as a detailed understanding of their relationships,has been a major area of research in modern cryptography.However,most of currently authenticated encryption schemes is lack of the essential security analysis.To analyze the security of scheme and the security for two authenticated encryption model: Encrypt and MAC,encrypt after MAC on the basis of the standard notions for the indistinguishability against chosen-plaintext attacks(IND-CPA).For each of these,the security proofs are proposed using Oracle model in the IND-CPA sence.The results indicate that the encrypt and MAC method is insecure against IND-CPA attack,but the encrypt after MAC is secure.
Keywords:authenticated encryption   CPA   indistinguishability   message authentication   symmetric encryption
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号