首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于身份的密钥协商协议安全分析与改进
引用本文:刘晶镭,陈湘涛,胡红宇,艾灵仙,蒋恒. 一种基于身份的密钥协商协议安全分析与改进[J]. 计算机工程与应用, 2012, 48(34): 88-91
作者姓名:刘晶镭  陈湘涛  胡红宇  艾灵仙  蒋恒
作者单位:1.湖南省永州职业技术学院 计算机系,湖南 永州 4250002.湖南大学 计算机科学与通信学院,长沙 410082
摘    要:认证密钥协商是保证参与者后续通信安全的一种重要机制。2007年,J.Oh等人提出了一种新的利用椭圆曲线密码体制的基于身份的认证密钥协商协议,该协议最大的特点是可以通过一次会话密钥协商过程生成两个会话密钥。但研究发现,该协议不能抵抗基本的冒充攻击和密钥泄露冒充攻击,详细地描述了这两个安全弱点后提出了一种新的改进方法,并分析了新协议的安全性。

关 键 词:信息安全  密钥协商  冒充攻击  密钥泄露冒充攻击  椭圆曲线  

Security analysis and improvement on ID-based authenticated key agreement protocol
LIU Jinglei , CHEN Xiangtao , HU Hongyu , AI Lingxian , JIANG Heng. Security analysis and improvement on ID-based authenticated key agreement protocol[J]. Computer Engineering and Applications, 2012, 48(34): 88-91
Authors:LIU Jinglei    CHEN Xiangtao    HU Hongyu    AI Lingxian    JIANG Heng
Affiliation:1.Computer Sciences Department, Yongzhou Vocational Technology College, Yongzhou, Hunan 425000, China2.College of Computer Sciences and Communications, Hunan University, Changsha 410082, China
Abstract:Authenticated key agreement is an important mechanism to ensure the security of subsequent communication among participants. In 2007, J. Oh et al. presented a new ID-based authenticated key agreement protocol using elliptic curve cryptosystem, the merit of this protocol is that the entities can establish two session keys using one key agreement process. However, this protocol is found that it is vulnerable to basic impersonation attack and key compromise impersonation attack, these security flaws are described and an improvement version is proposed, the security of this new protocol is also analyzed.
Keywords:information security  key agreement  impersonation attack  key compromise impersonation attack  elliptic curve
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号