首页 | 本学科首页   官方微博 | 高级检索  
     

可安全抵抗中间攻击的认证密钥交换
引用本文:李家兰,卢建朱,章磊.可安全抵抗中间攻击的认证密钥交换[J].计算机工程与应用,2005,41(2):133-135.
作者姓名:李家兰  卢建朱  章磊
作者单位:广州暨南大学计算机系,广州,510632;广州暨南大学计算机系,广州,510632;广州暨南大学计算机系,广州,510632
基金项目:国家自然科学基金项目(编号:60173038),广东省自然科学基金(编号:010421,000759)资助
摘    要:提出一种基于身份认证的密钥交换新方案,其安全性是同时基于离散对数和大整数分解难问题的。在进行密钥交换时,该方案能同时实现通信双方的身份认证和交换密钥的一致性认证,有效地抵抗冒名者的中间攻击和入侵者的重放攻击,提高了密钥交换的安全性和可靠性。特别是,该方案的交换密钥具有随机性,克服了Diffie-Hellman方案中交换密钥固定不变的弱点;通信双方一旦发现当前交换密钥泄露,可生成一个新的交换密钥,而不需修改系统的任何公开数据和用户的密钥。

关 键 词:密钥交换  身份认证  大整数分解  离散对数
文章编号:1002-8331-(2005)02-0133-03

Authenticated Key Exchange Scheme for Secure Against the Man-in-the-Middle Attack
Li Jialan,Lu Jianzhu,Zhang Lei.Authenticated Key Exchange Scheme for Secure Against the Man-in-the-Middle Attack[J].Computer Engineering and Applications,2005,41(2):133-135.
Authors:Li Jialan  Lu Jianzhu  Zhang Lei
Abstract:We present a new scheme for authenticated key exchange,the security of which is based on both discrete logarithm and big integer factorization.This scheme can implement identity authentication and key verification for both participants when key exchanging,which can effectively withstand the man-in-the-middle attack and the replay attack from intruders and enhance the security and reliability of key exchange.Especially,this scheme creates keys at random,hence overcomes the defect that the key is invariable in Diffie-Hellman algorithm,the participants can generate a new key once they find the current key is leaked out in no need of changing any public data or private key.
Keywords:key exchange  identity authentication  integer factorization  discrete logarithm
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号