首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于ECDH的可认证密钥协商协议
引用本文:李胜金,张昌宏,周大伟.一种基于ECDH的可认证密钥协商协议[J].信息安全与通信保密,2011,9(7):70-72.
作者姓名:李胜金  张昌宏  周大伟
作者单位:海军工程大学信息安全系,湖北武汉,430033
摘    要:针对Diffie-Hellman密钥交换协议和ECDH密钥协商协议的缺陷,给出了一种改进后的可认证密钥协商协议。该协议具有等献性、密钥不可控、密钥确认、完美前向安全以及抗已知密钥攻击等安全特性。跟以往的密钥协商协议相比,其管理简单、开销较低、安全性高、扩展性较好且实现了身份认证,以较低的计算成本和较高的运算效率实现了通信双方安全的会话密钥协商与密钥验证,能够较好地适用于大规模网络的端到端密钥管理。

关 键 词:椭圆曲线密码体制  密钥管理  密钥协商  网络安全

An Authenticated Key Agreement Protocol Based on ECDH
LI Sheng-jin,ZHANG Chang-hong,ZHOU Da-wei.An Authenticated Key Agreement Protocol Based on ECDH[J].China Information Security,2011,9(7):70-72.
Authors:LI Sheng-jin  ZHANG Chang-hong  ZHOU Da-wei
Affiliation:LI Sheng-jin,ZHANG Chang-hong,ZHOU Da-wei (Department of Information Security,Naval University of Engineering,Wuhan Hubei 430033,China)
Abstract:For the defects of Diffie-Hellman key exchange and ECDH protocol,an authenticated key agreement protocol is proposed. This proposed protocol is of such security properties as key uncontrollability,key confirmation,perfect forward security,and resistance to known key attacks. Furthermore,this protocol as compared with traditional ones,is simple in management,low in overhead,and high in security,and could achieve secure key agreement and verification between the communication parties with lower computing cost and higher efficiency. Analysis indicates that this protocol is fairly applicable to the end-to-end key management of large-scale networks.
Keywords:elliptic curve cryptography  key management  key agreement  network security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号