共查询到19条相似文献,搜索用时 62 毫秒
1.
2.
给出了一个基于公开密钥加密的认证协议。该协议可以实现通信双方的相互认证,同时产生双方认可的会话密钥,并且会话密钥的产生不需要其他第三方的参与。经过性能分析,该认证协议结构简单,执行效率高。 相似文献
3.
目前大部分基于身份的三方认证密钥协商协议都存在安全缺陷,文中在Xu等人提出的加密方案的基础上,设计了一种基于身份的三方认证密钥协商协议.该协议的安全性建立在BDDH假设基础上,经安全性分析,协议具有已知密钥安全,PKG前向安全,并能抵抗未知密钥共享攻击和密钥泄露伪装攻击,因此该协议是一个安全的三方密钥协商协议. 相似文献
4.
5.
6.
UAP协议不具有前向保密性和密钥泄露的安全性。论文提出了一种安全的AKC协议,简称SAKC协议,它不仅具有前向保密性和密钥泄露的安全性,还有较好的执行效率。 相似文献
7.
在移动通信中确保移动用户和网络之间的安全身份认证和密钥协商问题是非常关键的,可以为移动用户提供安全的访问网络,不会泄露用户自己所在的位置和身份信息,通过为用户发送匿名数字证书和临时签名私钥来为其提供服务,确保其信息安全,实现移动通信的安全通信和可靠通信. 相似文献
8.
3G认证和密钥分配协议的形式化分析及改进 总被引:4,自引:0,他引:4
介绍了第三代移动通信系统所采用的认证和密钥分配(AKA)协议,网络归属位置寄存器/访问位置寄存器(HLR/VLR)对用户UE(用户设备)的认证过程和用户UE对网络HLR/VLR的认证过程分别采用了两种不同的认证方式,前者采用基于"询问-应答"式的认证过程,后者采用基于"知识证明"式的认证过程.使用BAN形式化逻辑分析方法分别对这两种认证过程进行了分析,指出在假定HLR与VLR之间系统安全的前提下,基于"知识证明"式的认证过程仍然存在安全漏洞.3GPP采取基于顺序号的补充措施;同时,文中指出了另一种改进方案. 相似文献
9.
10.
11.
12.
通信协议宏是欧姆龙PLC特有的一种通信功能,可方便地实现与各种外围设备的串行通信。本文中欧姆龙PLC通过协议宏,使用三菱的计算机链接通信协议,与三菱PLC通信,进行数据交换。对通信协议宏应用中的一些细节问题也进行了讨论。 相似文献
13.
基于NGB的网络架构及协议的研究 总被引:1,自引:0,他引:1
通过探讨分析下一代广播电视网(NGB)的技术优势,揭示了NGB发展是我国三网合一的必然选择。重点分析NGB的网络架构和技术,实际应用中的网络设计,宽带认证通信协议的设计,面临的问题和思考。 相似文献
14.
随着第五代移动通信(Fifth Generation:5G)技术标准的完善,5G在各个领域受到前所未有的关注,然而5G依然面临一些安全挑战。针对5G终端的接入安全和数据安全问题,指出合适的密码技术解决方案。对于接入认证问题,可以采用无证书密码体制、基于同态加密的数据聚合机制,以及基于身份的聚合签密等密码技术来解决。对于数据存储和共享安全问题,可以采用属性基加密和抗密钥泄露技术来解决。随着5G的商用,上述密码技术与5G安全研究将具有重要的理论与实际意义。 相似文献
15.
针对3G网络应用的普遍性,采用基于PKI证书的信任和标识安全机制,提出了针对个人定位的策略和范例,并讨论了其优点。 相似文献
16.
GSM向3G演进系统安全的改进 总被引:4,自引:0,他引:4
介绍了GSM向3G过渡时期GSM用户的认证与密钥协商过程,分析了GSM用户对3G系统的安全威胁,并对GSM用户接入3G系统提出了改进认证与加密算法。它可以有效防止攻击者假冒合法GSM用户滥用UTRAN网络资源,并可以保证用户的通信安全。 相似文献
17.
Jun Zhang Minghao Wang Shui Yu Tao Zhang Tianqing Zhu Wanlei Zhou 《Digital Communications & Networks》2020,6(3):281-291
With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions. These investigations include the fundamental security and privacy problems associated with 6G technologies. Therefore, in order to consolidate and solidify this foundational research as a basis for future investigations, we have prepared a survey on the status quo of 6G security and privacy. The survey begins with a historical review of previous networking technologies and how they have informed the current trends in 6G networking. We then discuss four key aspects of 6G networks – real-time intelligent edge computing, distributed artificial intelligence, intelligent radio, and 3D intercoms – and some promising emerging technologies in each area, along with the relevant security and privacy issues. The survey concludes with a report on the potential use of 6G. Some of the references used in this paper along and further details of several points raised can be found at: security-privacyin5g-6g.github.io. 相似文献
18.
A cartesian product construction for unconditionally secure authentication codes that permit arbitration 总被引:11,自引:0,他引:11
Gustavus J. Simmons 《Journal of Cryptology》1990,2(2):77-104
An authentication code consists of a collection of encoding rules associating states of an information source with messages that are to be used to communicate the state to a designated receiver. In order for a collection of encoding rules to be useful as an authentication code there must also exist one or more probability distributions on the rules which, if used by the receiver and transmitter (the insiders) to choose secretly the encoding rule they use, will result in the receiver being able to (probably) detect fraudulent messages sent by an outsider or modifications by him of legitimate messages.Authentication codes that permit arbitration are codes that in addition to protecting the insiders from deception by outsiders, also protect against some forms of insider deception. This is accomplished by making it possible for an arbiter to resolve (again in probability) certain disputes between the transmitter and receiver: the transmitter disavowing a message that he actually sent or the receiver claiming to have received a message that the transmitter did not send.An infinite class of authentication codes that permit arbitration is constructed and some bounds on the probability of a deception going undetected are proven. These codes are shown to be unconditionally secure, i.e., it is shown that the probability of a deception either going undetected or else of being unjustly attributed to an innocent party is independent of the computing capability or investment that a would-be cheater is willing to make.This work was performed at the Sandia National Laboratories and was supported by the U.S. Department of Energy under Contract No. DE-AC04-76DP00789. 相似文献
19.
方姝妹 《信息安全与通信保密》1995,(1)
本文首先介绍鉴别业务的一些基本概念,接着提出Kerberos鉴别方法,强调了它优于其它鉴别方法的特性。Kerberos鉴别方法的工作原理、程序及其应用是本文阐述的主要内容。另外,还对Kerberos与其它工具相结合的使用情况以及Kerberos的局限性做了介绍。 相似文献