首页 | 本学科首页   官方微博 | 高级检索  
     

一种三方认证密钥协商协议的分析与改进
引用本文:唐祚波,缪祥华.一种三方认证密钥协商协议的分析与改进[J].计算机工程,2013,39(1):140-143.
作者姓名:唐祚波  缪祥华
作者单位:昆明理工大学信息工程与自动化学院,昆明,650500
摘    要:大多数三方认证密钥协商协议不能抵抗中间人攻击。为此,对Tan提出的三方认证密钥协商协议(Journal of Communications, 2010, No.5)进行分析,证明其不能抵抗发起者假冒攻击、响应者假冒攻击及中间人攻击,并利用单向哈希函数和椭圆曲线密码学技术对协议进行改进。理论分析与形式化证明结果表明,改进协议继承了原协议的安全性,并能抵抗假冒攻击及中间人攻击。

关 键 词:三方认证密钥协商协议  假冒攻击  中间人攻击  椭圆曲线  单向哈希函数  CDH假设
收稿时间:2012-03-19
修稿时间:2012-05-06

Analysis and Improvement of a Three-party Authenticated Key Agreement Protocol
TANG Zuo-bo , MIAO Xiang-hua.Analysis and Improvement of a Three-party Authenticated Key Agreement Protocol[J].Computer Engineering,2013,39(1):140-143.
Authors:TANG Zuo-bo  MIAO Xiang-hua
Affiliation:(College of Information Engineering & Automation, Kunming University of Science and Technology, Kunming 650500, China)
Abstract:Most Three-party Authenticated Key Agreement(3PAKA) protocols are susceptible to man-in-the-middle attack. This paper analyzes security of the 3PAKA protocol presented by Tan, and proves that it can not withstand counterfeit attacks and man-in-the-middle attack. To enhance its security, an improved protocol is proposed by one-way hash function and elliptic curve cryptography. Security analysis and formal proof results show that the improved protocol inherits the security of the original protocol, and is able to resist counterfeit attack and man-in-the-middle attack.
Keywords:Three-party Authenticated Key Agreement(3PAKA) protocol  counterfeit attack  man-in-the-middle attack  elliptic curve  one-way hash function  Computational Diffie-Hellman(CDH) assumption
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号