期刊文献+

用于多媒体加密的基于身份的密钥协商协议的安全性 被引量:1

Security on ID-Based Key Agreement for Multimedia Encryption
下载PDF
导出
摘要 最近Yi等(2002)提出了一个用于多媒体加密的基于身份的密钥协商协议。协议建立在Diffie-Hellman密钥交换协议和RSA公钥密码体系之上。Yi等分析了协议的安全性,并认为该协议对于恶意攻击是鲁棒的。然而,本文证明该协议对于某些攻击如伪造秘密信息和篡改交换消息是脆弱的,并分析了该协议受到这些攻击的原因。本文指出由于该协议内在的缺陷,该协议可能难于改善。 Recently, Yi et al,.(2002) proposed an ID-based key agreement protocol for multimedia encryption. The protocol was built on both the Diffie-Hellman key exchange protocol and the RSA public key cryptosystem. Yi et al, analyzed the security of the protocol, and understood that the protocol is robust to the malicious attacks, However, this paper shows that the protocol is vulnerable to certain malicious attacks such as forging secret information and tampering exchanging messages and analyzes the reasons that the protocol suffers these attacks, This paper points out that it may be hard to improve the protocol due to the inherent flaw of the protocol,
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第4期892-894,共3页 Journal of Electronics & Information Technology
基金 国家863计划(2004AA119010) 国家自然科学基金(60472043)资助课题
关键词 安全性 基于身份的密钥协商 恶意攻击 Security ID-based key agreement Malicious attack
  • 相关文献

参考文献9

  • 1Yi X,Tan C H,and Siew C K,et al..ID-based key agreement for multimedia encryption.IEEE Trans.on Consumer Electronics,2002,48 (2):298-303.
  • 2Bird R,Gopal I,and Herzberg A,et al..Systematic design of two-party authentication protocols.Advances in Cryptology CRYPTO'91,Santa Barbara,1991:44-61.
  • 3Diffie W,Oorschot P,and Wiener M.Authentication and authenticated key exchanges.Designs,Codes and Cryptography,1992 2(2):107-125.
  • 4Bellare M and Rogaway P.Provably secure session key distribution.Advances in Cryptology CRYPTO'93,Santa Barbara,1993:232-249.
  • 5毛文波.现代密码学:理论与实践.北京:电子工业出版社,2004.
  • 6Wilson S B and Menezes A.Authenticated Diffie-Hellman key agreement protocols.Fifth Annual Workshop on Selected Areas in Cryptography,Ontario,1998:339-361.
  • 7卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117
  • 8卿斯汉.安全协议的设计与逻辑分析[J].软件学报,2003,14(7):1300-1309. 被引量:69
  • 9Schneier B.Applied Cryptography:Protocols,Algorithms,and Source Code in C.New York:John Wiley & Sons,Inc.1996:246-246.

二级参考文献6

共引文献174

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部