期刊文献+

一个无线认证协议的分析与改进 被引量:1

Analysis and Improvement of an Anonymous Wireless Authentication Protocol
下载PDF
导出
摘要 分析了一个匿名移动无线认证方案中的CSAP协议,发现其存在安全漏洞,无法抵抗不诚实的基站对系统的攻击.针对这些安全漏洞对该协议进行了改进,改进后的协议不仅保留了原方案的所有安全特性,并且比原协议具有更高的安全性. By analyzing the security of an anonymous wireless authentication scheme,it is pointed out that the CSAP protocol in that scheme suffers from some security vulnerabilities which are vulnerable to an attack by a malicious base station. An improved scheme to overcome the weakness is proposed, and the improved scheme that preserves all the security properties in the original scheme possesses higher security.
出处 《郑州大学学报(理学版)》 CAS 2006年第2期40-42,58,共4页 Journal of Zhengzhou University:Natural Science Edition
关键词 无线系统 认证 密码协议 wireless system authentication cryptographic protocol
  • 相关文献

参考文献5

  • 1WANG S J.Anonymous wireless authentication on a portable cellular mobile system[J].IEEE Transactions on Computers,2004,53(10):1317-1329.
  • 2TATEBAYASHI M,MATSUZAKI N,NEWMAN D B.Key distribution protocol for digital mobile communication systems[C].In:WIENER M,ed.Proceedings of Advances in Cryptology-CRPYTO'89.Berlin:Springer-Verlag,1990:324-333.
  • 3ASHAR A,DIFFIE W.Privacy and authentication for wireless local area networks[C].In:SUN M.IEEE Personal Comm[C].New Jersey:IEEE Educational Activities Department,1994:25-31.
  • 4WEIGOLD T.Jave-based wireless identity module[C].In:JOHN M.The Proceedings of LCS 2002.London:UK University Co,2002.
  • 5MENEZES A J,VAN OORSCHOT P C,VANSTONE S A.Handbook of applied cryptography[M].CRC Press,1997.

同被引文献5

  • 1Mao W B.现代密码学的理论与实践[M].王继林,译.北京:电子工业出版社,2004:389-390.
  • 2Datta A, Derek A, Mitchell J C,et al. Protocol Composition Logic (PCL)[J]. Electronic Notes in Theoretical Computer Science(ENTCS), 2007, 172 : 311-358.
  • 3Roy A, Datta A, Derek A, et al. Secrecy analysis in Protocol Composition Logic[C]//The llth Annual Asian Computing Science Conference (ASIAN'06). Tokyo, 2006.
  • 4Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Transactionson Computer Systems, 1990,8(1) : 18-36.
  • 5Paulson L C. Proving properties of security protocols by induction[C]// Proceedings of the 10th IEEE Computer Society Symposium on Research in Security and Privacy. USA: Rockport, MA, 1997: 70-83.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部