期刊文献+

安全有效的相互认证和密钥建立协议

Security Mutual Authentication and Key Establishing Protocol
下载PDF
导出
摘要 在无线通信系统中,相互认证和密钥建立协议不仅要在实现实体间的相互认证的基础上建立唯一的共享会话密钥,而且协议本身还应当满足一定的安全要求,如防止假冒攻击、服务的不可否认性等。在结合椭圆曲线密码体制优点的基础上,提出一种适于无线通信网络中的相互认证和密钥建立协议,不仅能有效防止上述攻击,还适于在无线终端设备上应用。 In a wireless mobile communication system, mutual authentication and key establishing protocols not only need to establish a shared key for encrypt information exchange in conversation on the basis of mutual authentication, but they also need to satisfy essential security requirements, including forward secrecy, impersonated attack and man-in-middle attack, etc. This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals.
作者 刘志猛 范辉
出处 《淮海工学院学报(自然科学版)》 CAS 2007年第2期24-27,共4页 Journal of Huaihai Institute of Technology:Natural Sciences Edition
基金 国家自然科学基金资助项目(60673153) 山东省自然科学基金资助项目(Y2005G09)
关键词 无线通信网络 椭圆曲线密码体制 相互认证和密钥建立 会话密钥 wireless mobile system elliptic curve cryptography mutual authentication and key establishment session key
  • 相关文献

参考文献7

  • 1KOBLITZ N.Elliptic curve cryptosystems[J].Math of Computation,1987,48(177):203-209.
  • 2MILLER V.Use of elliptic curve in cryptography[A].Advances in Cryptology-Crypto'85 proceedings[C].London:Springer Verlag,1986:417-426.
  • 3AYDOS M,SAVAS E,KOC C K.Implementing Network Security Protocols based on Elliptic curve Cryptography[J].http://www.christianroepke.de/studium/asy-krypto/gf2-ecc-.pdf.
  • 4KRISTIN L.The advantages of Elliptic Curve Cryptography for wireless security[J].IEEE Wireless Communication,2004,11(2):62-67.
  • 5WONG D S,CHAN A H.Mutually authentication and key exchange for low power wireless commutications[J].Proc IEEE MILCOM 2001 Conf,2001,12(1):39-43.
  • 6LIU Zhimeng ZHAO Yanli FAN Hui.A Secure MAKAP for Wireless Communication[J].Wuhan University Journal of Natural Sciences,2006,11(6):1749-1752. 被引量:3
  • 7BLANK-WILSON,JOHNSON D,MENEZES A.Key agreement protocols and their security analysis[A].Proceedings of the sixth IMA International Conference on Cryptography and Coding,Lecture Notes in Computer Science 1355[C].New York:Springer-Verlag,1997:30-45.

二级参考文献11

  • 1Whitfield Diffie,Paul C. Oorschot,Michael J. Wiener.Authentication and authenticated key exchanges[J].Designs Codes and Cryptography.1992(2)
  • 2Diffie W,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchanges[].Designs Codes and Cryptography.1992
  • 3Koblitz N.Elliptic curve cryptosystems[].Mathematics of Computation.1987
  • 4V.S. Miller.use of elliptic curve in cryptography[].CRYPTO.1985
  • 5Sun H. M,Hsieh B. T,Tseng S. M.Cryptanalysis of Aydos etal.’s ecc-based wireless authentication protocol[].Proceedings of the IEEE International Conference on e-Technology e-Commerce and e-Service.2004
  • 6Aydos M,Sunar B.An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication [ EB/OL]. http:// www. crypto. wpi.edu/ Publications / Documents/ask-98-an.pdf . 2005
  • 7Aydos M,Savas E.Implementing Network Security Proto- cols Based on Elliptic Curve Cryptography. http:// www.christianroepke.de/ studium/asy- krypto/gf2-ecc-pdf . 2005
  • 8Mugino S.Elliptic Curve Cryptosystems. http:// www.cs.mcgill.ca/-crepeau/ PDF/ moi- remugino.pdf . 2005
  • 9Vanstone S A.Next Generation Security for Wireless :Elliptic Curve Cryptography. http:// www. compseconline.com/hottopics/hottopic20-8/ Next.pdf . 2005
  • 10Mangipudi K,Malneedi N,Katti R.Attack and Solutions on Aydos-Savas-Koc’’s Wireless Authentication Protocol[].Global Telecommunications Conference GLOBE- COM’’.2004

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部