摘要
最近Yi等(2002)提出了一个用于多媒体加密的基于身份的密钥协商协议。协议建立在Diffie-Hellman密钥交换协议和RSA公钥密码体系之上。Yi等分析了协议的安全性,并认为该协议对于恶意攻击是鲁棒的。然而,本文证明该协议对于某些攻击如伪造秘密信息和篡改交换消息是脆弱的,并分析了该协议受到这些攻击的原因。本文指出由于该协议内在的缺陷,该协议可能难于改善。
Recently, Yi et al,.(2002) proposed an ID-based key agreement protocol for multimedia encryption. The protocol was built on both the Diffie-Hellman key exchange protocol and the RSA public key cryptosystem. Yi et al, analyzed the security of the protocol, and understood that the protocol is robust to the malicious attacks, However, this paper shows that the protocol is vulnerable to certain malicious attacks such as forging secret information and tampering exchanging messages and analyzes the reasons that the protocol suffers these attacks, This paper points out that it may be hard to improve the protocol due to the inherent flaw of the protocol,
出处
《电子与信息学报》
EI
CSCD
北大核心
2007年第4期892-894,共3页
Journal of Electronics & Information Technology
基金
国家863计划(2004AA119010)
国家自然科学基金(60472043)资助课题