期刊文献+

基于LUC的密钥共识协议

New key agreement protocol based on LUC system
下载PDF
导出
摘要 网络上进行保密通信,通信双方能否安全地进行,很大程度上取决于密钥的安全分配和协商。已有的密钥共识协议不能抵抗主动攻击。RSA密码体制用于身份验证时,不能抵抗乘法攻击。通过对LUC公钥密码体制的研究,给出了新的密钥共识协议,并为研究密钥共识问题提供了新的思路。新的协议可以抵抗被动攻击并发现主动攻击;储存密钥密文的攻击对本协议无效。 Modem cryptography must satisfy requirement that the security of the system depend on the secrecy of the keys but not the secrecy of the algorithms of encryption or decryption. If two users want to communicate in network, they must find an independent but secure method for exchanging the key by themselves. A key agreement protocol is invulnerable to passive and active attack. A new principle of data transmission was described on basis of the difficulty of solving the uncertain equation. Then, a new authentication key agreement protocol was presented according to the principle and the LUC PKC. The new protocol can withstand the passive attack and find active attack and guard against the attack of storing the key message.
作者 王瑞民
出处 《计算机工程与设计》 CSCD 北大核心 2006年第5期852-854,共3页 Computer Engineering and Design
关键词 RSA LUC 密钥共识 主动攻击 被动攻击 RSA LUC key agreement protocol active attack passive attack
  • 相关文献

参考文献6

  • 1陈卓,张正文,王瑞民.IKE安全机制的研究[J].计算机工程与设计,2004,25(4):540-542. 被引量:5
  • 2王瑞民,洪帆,陈卓.基于正交表的双无规范密码方案[J].小型微型计算机系统,2004,25(8):1499-1501. 被引量:1
  • 3Diffie W, Hellman M E.New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6):644-654.
  • 4Ham L,Yang S B.ID-based cryptographic schemes for user identification[J].Digital Signature and Key Distribution,IEEE J Seclect, 1999,71 (2):757-760.
  • 5Matsumoto T, Takashima Y, Imai H. On seeking smart public key distribution systems[J].The transactions of the IECE of Japan, 1986,69(2): 99-106.
  • 6Smith ELUC public key encryption[J].Dr Dobb's Journal, 1993,18(1):44-49.

二级参考文献9

  • 1隆永红.用于双无规范密码体制的拉丁阵的设计[J].计算机学报,1996,19(4):247-253. 被引量:1
  • 2NaganandDoraswamy''''DanHarkins.IPSec:新一代因特网安全协议[M].北京:机械工业出版社,2000.70-81.
  • 3Jianying Zhou.Further analysis of the intearnet key exchange protocol[J].Computer Communications'2000,(11):1602-1612.
  • 4CarltonDavisR.IPSec:VPN的安全实施[M].北京:清华大学出版社,2002..
  • 5Harkins D'Carrel D.The Internet key exchange (IKE)[S].RFC 2409'1998.
  • 6Michael S Borella.Methods and protocols for secure key negotiation using IKE [J].IEEE Network'2000'(7-8):18-27.
  • 7Maughan D'Schertler M'Schneider M'et al.Internet security association and key management protocol (ISAKMP)[S].RFC 2408'1998.
  • 8Orman H.The oailey key determination of interpretation for ISAKMP [S].RFC 2407,1998.
  • 9陶仁骥.(4,4)-拉丁阵在密码设计上的一种应用[J].计算机学报,1991,14(6):423-431. 被引量:13

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部