首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于口令的密钥协商协议的改进与设计
引用本文:周洲,彭长根,杨玉龙.基于口令的密钥协商协议的改进与设计[J].信息网络安全,2014(1):48-51.
作者姓名:周洲  彭长根  杨玉龙
作者单位:[1]贵州大学计算机科学与技术学院,贵州贵阳550025 [2]贵州大学理学院,贵州贵阳550025 [3]贵州大学密码学与数据安全研究所,贵州贵阳550025
基金项目:基金项目:国家自然科学基金[61262073]、全国统计科学研究计划[2013LZ46]、贵州省自然科学基金[20092113]、贵州省高层次人才科研备件特助经费项目[TZJF-2008-33]
摘    要:针对Diffie—Hellman协议易遭受中间人攻击的缺陷,文章采用共享口令和随机化的方式进行身份认讧,提出了一种基于口令的D—H密钥协商协议。通过对Byun和Lee的基于口令的群密钥协商方案及胡红宇的改进方案进行分析,发现改进后的协议存在不完整认证,会遭到篡改。文章首先对相关方案进行改进和完善,并在此基础之上,结合所改进的D—H密钥协商协议,基于椭圆曲线构造了一种在认证中传递消息的群密钥协商协议。

关 键 词:Diffie—Hellman密钥协商  中间人攻击  基于口令的认证  群密钥协商

Improvement and Design of Password-based Authenticated Key Agreement Protocol
ZHOU Zhou,PENG Chang-gen,YANG Yu-long.Improvement and Design of Password-based Authenticated Key Agreement Protocol[J].Netinfo Security,2014(1):48-51.
Authors:ZHOU Zhou  PENG Chang-gen  YANG Yu-long
Institution:1 .College of Computer Science & Information, Guizhou University, Guiyang Guizhou 550025, China;2. College of Science, Guizhou University, Guiyang Guizhou 550025, China,3. Institute of Cryptography & Data Security, Guizhou University, Guiyang Guizhou 550025, China)
Abstract:Diffie-Hellman protocol is vulnerable to man-in-the-middle attack, this paper proposes a password- based DH key agreement protocol using shared passwords and randomized manner authentication, By studying Byun and Lee's password-based group key agreement scheme and HU's improvement for it, This paper finds that the improved protocol has not complete certification and it would be tampered with.This article first improves and perfects the relevant programs and on this basis, combining with the improved DH key agreement protocol and basing on elliptic curve, constructs a group key agreement protocol in which the delivery message can be get in the certification.
Keywords:Diffie-Hellman key agreement  man-in-the-middle attack  password-based authentication  group key agreement
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号