首页 | 本学科首页   官方微博 | 高级检索  
     

设计密码协议的若干原则与方法
引用本文:赵华伟,刘月.设计密码协议的若干原则与方法[J].计算机应用与软件,2011(10).
作者姓名:赵华伟  刘月
作者单位:山东财政学院计算机信息工程学院;山东省邮政电子商务公司;
基金项目:国家自然科学基金(60873041)
摘    要:传统的密码协议设计主要考虑理想环境下运行的安全性。为了设计实用安全的密码协议,首先对理想环境下密码协议中存在的主要攻击进行研究和总结,提出四条协议设计原则,以避免常见的设计缺陷;然后通过对消息完整性的研究,提出一种协议转换算法,可将理想环境下安全的密码协议转换为现实环境下安全的密码协议,并证明算法的安全性。该转换算法的提出,有助于设计在现实环境下运行安全的密码协议。

关 键 词:密码协议  理想环境  现实环境  转换算法  

SEVERAL PRINCIPLES AND METHODS FOR DESIGNING CRYPTOGRAPHIC PROTOCOLS
Zhao Huawei Liu Yue.SEVERAL PRINCIPLES AND METHODS FOR DESIGNING CRYPTOGRAPHIC PROTOCOLS[J].Computer Applications and Software,2011(10).
Authors:Zhao Huawei Liu Yue
Affiliation:Zhao Huawei1 Liu Yue2 1(School of Computer and Information Engineering,Shandong University of Finance,Jinan 250014,Shandong,China) 2(Shandong Post E-Commerce Corporation,China)
Abstract:Traditional cryptographic protocol design focuses mainly on the security issue in a perfect environment.In order to design practical and secure cryptographic protocols,at first the primary attacks upon cryptographic protocols in a perfect environment is studied and summarized,so that four principles for protocol design is proposed in order to avoid common design defects;next,through studying message integrity,a protocol transformation algorithm is proposed which can turn secure cryptographic protocols in a ...
Keywords:Cryptographic protocol Perfect environment Real environment Transformation algorithm  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号