首页 | 本学科首页   官方微博 | 高级检索  
     

计算机分布式环境中的认证与密钥分配研究
引用本文:孙晓蓉,王育民. 计算机分布式环境中的认证与密钥分配研究[J]. 计算机学报, 1999, 22(6): 577-581
作者姓名:孙晓蓉  王育民
作者单位:西安电子科技大学ISN国家重点实验室,西安,710071
基金项目:国家自然科学基金,九五军事电子预研基金
摘    要:根据网络和计算机分布式环境的特点,采用单钥算法和公钥算法相结合的方法设计了认证与密钥分配协议,协议采用单钥密码算法设计域内认证与密钥分配协议,而采用公钥密码算法实现域间认证和密钥交换,简化了系统的密钥管理问题,为了保证公钥的真实性,文章提出了一种适合计算机分布式环境的,可在全球扩展的分层次公钥分配架构,协议中用户采用公钥算法进行联网初始登录,代替键入口令,有效地防止口令猜测和重放攻击。

关 键 词:分布式环境  公钥体制  单钥体制  认证与密钥分配
修稿时间:1998-05-18

AUTHENTICATION AND KEY DISTRIBUTION PROTOCOL FOR DISTRIBUTED COMPUTER ENVIRONMENT
SUN Xiao-rong,WANG Yu-Min. AUTHENTICATION AND KEY DISTRIBUTION PROTOCOL FOR DISTRIBUTED COMPUTER ENVIRONMENT[J]. Chinese Journal of Computers, 1999, 22(6): 577-581
Authors:SUN Xiao-rong  WANG Yu-Min
Abstract:An authentication and key distribution protocol for network and distributed environment is presented by using hybrids of asymmetric cryptosystem and symmetric cryptosystem. The intra domain authentication and key distribution is based on symmetric cryptosystem, and inter domain authentication is designed by using asymmetric cryptosystem, this can simplifies key management of the system. A hierarchical certificate authority (CA) structure for distributed environment is proposed for certifying the validity of public keys. In the protocol, login based on password is replaced by initial registering based on asymmetric cryptosystem, then guessing password attack can be against effectively.
Keywords:Distributed environment   asymmetric cryptosystem   symmetric cryptosystem   authentication and key distribution.
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号