首页 | 本学科首页   官方微博 | 高级检索  
     

适用于双方频繁通信的密钥交换协议
引用本文:易通,李学宝,陈宏朝.适用于双方频繁通信的密钥交换协议[J].计算机工程与科学,2014,36(7):1284-1289.
作者姓名:易通  李学宝  陈宏朝
基金项目:国家自然科学基金资助项目(61163025);内蒙古高等学校科学技术研究资助项目(NJZY12200);2013年广西研究生教育创新计划资助项目(YCSZ2013042)
摘    要:首先对以前提出的一个高效的基于验证元的三方密钥交换协议进行了安全性分析,指出了它容易受到服务器密钥泄露攻击等安全威胁,且缺乏前向安全性;并以此为基础,针对大多数现存的基于验证元的3PAKE协议均难以抵御服务器密钥泄露攻击的现状,提出了一个新的3PAKE协议。通过安全性分析,证明了新协议比原协议更安全,能够抵御各种已知的攻击,且与现有的大多数同类协议相比具有更高的效率。

关 键 词:基于验证元  三方密钥交换协议  服务器密钥泄露攻击  会话密钥  前向安全性  
收稿时间:2013-02-17
修稿时间:2014-07-25

A novel key exchange protocol for frequent communication
YI Tong,LI Xue bao,CHEN Hong chao.A novel key exchange protocol for frequent communication[J].Computer Engineering & Science,2014,36(7):1284-1289.
Authors:YI Tong  LI Xue bao  CHEN Hong chao
Affiliation:(1.College of Computer Science & Information Engineering,Guangxi Normal University,Guilin 541004; 2.School of Information Science and Technology,Baotou Normal University,Baotou 014030,China)
Abstract:Firstly, an efficient verifier based three party password authenticated key exchange protocol previously proposed is analyzed. The protocol is vulnerable to security threats such as server key disclosure attack and so on, and has a lack of forward secrecy. Secondly, on the basis of the analysis, in order to solve the problem that most of existing verifier based 3PAKE protocols cannot resist server key disclosure attack, a novel 3PAKE protocol is proposed. Through security analysis, the new protocol can be proved to be more secure than the old one, and has the ability to resist all known attacks. In addition, compared with existing protocols, it is more efficient.
Keywords:verifier-based  password-authenticated key exchange protocol for three-party  server key disclosure attack  session key  forward secrecy  
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号