首页 | 本学科首页   官方微博 | 高级检索  
     

鲁棒且高效的远程认证及密钥协商协议
引用本文:唐宏斌,刘心松. 鲁棒且高效的远程认证及密钥协商协议[J]. 计算机应用, 2012, 32(5): 1381-1384
作者姓名:唐宏斌  刘心松
作者单位:电子科技大学 计算机科学与工程学院,成都 610054
摘    要:由于口令容易记忆,基于口令的认证协议已被广泛采用于各种网络服务中。然而由于口令的低熵性导致了基于口令的认证协议易遭受到各种攻击。2011年,Islam等(ISLAM SK H, BISWAS G P. Improved remote login scheme based on ECC. IEEE-International Conference on Recent Trends in Information Technology. Washington, DC: IEEE Computer Society, 2011: 1221-1226)提出一种改进的基于椭圆曲线的远程登录协议,该协议存在着被盗校验子攻击和客户身份冒充攻击,同时并未能提供双向认证。为了解决此类问题提出了一种基于椭圆曲线的远程认证和密钥协商协议(RAKA),RAKA基于椭圆曲线离散对数难题,在执行过程中只需做6次点乘运算和7次哈希运算,比Islam等协议少用1次点乘运算,协议效率提高约15%,是一种比Islam等协议更安全、高效的协议。

关 键 词:密码学  认证  协议  椭圆曲线密码系统  密钥协商  口令  
收稿时间:2011-11-07
修稿时间:2011-12-15

Robust and efficient remote authentication with key agreement protocol
TANG Hong-bin , LIU Xin-song. Robust and efficient remote authentication with key agreement protocol[J]. Journal of Computer Applications, 2012, 32(5): 1381-1384
Authors:TANG Hong-bin    LIU Xin-song
Affiliation:School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 610054, China
Abstract:Password-based authentication and key exchange protocol have been widely used in various network services due to easy memory of password.Unfortunately,password-based authentication scheme also suffers from attacks because of the low entropy of password.In the year 2011,Islam et al.(ISLAM SK H,BISWAS G P.Improved remote login scheme based on ECC.IEEE-International Conference on Recent Trends in Information Technology.Washington,DC: IEEE Computer Society,2011: 1221-1226)proposed an improved remote login scheme based on Elliptic Curve Cryptography(ECC).Whereas,the scheme was vulnerable to stolen-verifier and impersonation attacks and failed to provide mutual authentication.Therefore,the authors proposed a password-based Remote Authentication with Key Agreement(RAKA) protocol using ECC to tackle the problems in Islam et al.’s scheme.RAKA was based on Elliptic Curve Discrete Logarithm Problem(ECDLP) and needed to compute six elliptic curve scale multiplications and seven hash function operations during a protocol run.The efficiency improves by about 15%.It is more secure and efficient than Islam et al.’s scheme.
Keywords:cryptography  authentication  protocol  Elliptic Curve Cryptosystem(ECC)  key agreement  password
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号