摘要
给出了对MAKAP协议的一种并行攻击方法,利用该方法,攻击者能够在用户面前扮演诚实的服务器,同时在服务器面前扮演用户。攻击结束后,服务器认为自己已和用户成功建立起会话密钥,其实用户根本没有和服务器通信。分析了此协议遭受攻击的原因,在此基础上,对MAKAP协议进行改进,获得了MAKAP1协议。在随机谕示模型下证明:若DDHP不可解,则MAKAP1协议是安全的AK协议。
MAKAP protocol is a mutual authentication key agreement protocol. An attack that makes the adversary to personate the receiver successfully is proposed. When the attack is finished, the server thinks he has established a session key with the user. But in fact, the user does not communicate with the server at all. An improved variant of the MAKAP protocol is given, and the paper proves that in the random oracle model, the improved protocol is a secure AK protocol assuming the DDHP is intractable.
出处
《计算机工程》
CAS
CSCD
北大核心
2007年第13期22-24,51,共4页
Computer Engineering
基金
国家自然科学基金资助项目(60473021
60503012)
广东省信息安全技术重点实验室开放基金资助项目
关键词
密钥协商协议
安全AK协议
匹配对话
key agreement protocol
secure AK protocol
matching conversation