期刊文献+

对MAKAP协议的攻击及其改进 被引量:1

Attack and Improvement on MAKAP Protocol
下载PDF
导出
摘要 给出了对MAKAP协议的一种并行攻击方法,利用该方法,攻击者能够在用户面前扮演诚实的服务器,同时在服务器面前扮演用户。攻击结束后,服务器认为自己已和用户成功建立起会话密钥,其实用户根本没有和服务器通信。分析了此协议遭受攻击的原因,在此基础上,对MAKAP协议进行改进,获得了MAKAP1协议。在随机谕示模型下证明:若DDHP不可解,则MAKAP1协议是安全的AK协议。 MAKAP protocol is a mutual authentication key agreement protocol. An attack that makes the adversary to personate the receiver successfully is proposed. When the attack is finished, the server thinks he has established a session key with the user. But in fact, the user does not communicate with the server at all. An improved variant of the MAKAP protocol is given, and the paper proves that in the random oracle model, the improved protocol is a secure AK protocol assuming the DDHP is intractable.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第13期22-24,51,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60473021 60503012) 广东省信息安全技术重点实验室开放基金资助项目
关键词 密钥协商协议 安全AK协议 匹配对话 key agreement protocol secure AK protocol matching conversation
  • 相关文献

参考文献7

  • 1Diffie W,Hellman M.New Directions in Cryptography[J].IEEE Transcations on Information Theory,1976,22(6):644-654.
  • 2Matsumoto T,Takashima Y,Imai H.On Seeking Smart Public-key Distribution Systems[J].Transcations of the IECE of Japan,1986,E69(2):99-106.
  • 3Law L,Menezes A,Qu M,et al.An Efficient Protocol for Authenticated Key Agreement[Z].2003.http://www.cacr.math.uwater loo.ca.
  • 4National Security Agency.SKIPJACK and KEA Algorithm Specification[Z].1998.http://csrc.nist.gov/encryption/skipjack-kea.htm.
  • 5Wilson B,Johnson D,Menezes A.Key Agreement Protocols and Their Security Analysis[C]//Proceedings of the 6th IMA International Conference on Cryptography and Coding.Heidelberg:Springer-Verlag,1997:30-45.
  • 6Bellare M,Rogaway P.Entity Authentication and Key Distribution[C] //Proceedings of the CRYPTO'93.Heidelberg:Springer-Verlag,1994:232-249.
  • 7邓红素,左益强,赵一鸣,鲍振东.移动通信中可证安全的双向认证密钥协商协议[J].软件学报,2003,14(8):1489-1494. 被引量:14

二级参考文献5

  • 1Wong DS, Chan AH. Mutual authentication and key exchange for low power wireless communications. In: Edmonds A, Yenser G,Ferrari G, eds. Proceedings of the IEEE MILCOM 2001 Conference. Washington DC: IEEE Communication Society, 2001.39,43.
  • 2Jakobsson M, Pointcheval D. Mutual authentication for low-power mobile devices. In: Syverson PF, ed. Proceedings of the Financial Cryptography 2001. Heidelberg: Springer-Verlag, 2001. 178-195.
  • 3Bellare M, Rogaway P. Entity authentication and key distribution. In: Stinson DR, ed. Proceedings of the CRYPTO'93. Lecture Notes in Computer Science Vol.773, Heidelberg: Springer-Verlag, 1994. 232-249.
  • 4Bellare M, Rogaway P. Provably secure session key distribution--the three party case. In: Leighton FT, Borodin A, eds.Proceedings of the 27th ACM Symposium on Theory of Computing. Las Vegas: ACM, 1995.57-66.
  • 5Lee SW, Hung SM, Yoon HS, Cho YK. Accelerating key establishment protocols for mobile communication. In: Pieprzyk J,Safavi-Naini R, Seberry J, eds. Information Security and Privacy, Proceedings of the 4th Australasian Conference, ACISP'99 Proceedings. Lecture Notes in Computer Science, Vol. 1587, Heidelberg: Springer-Verlag, 1999. 51-63.

共引文献13

同被引文献6

  • 1周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 2邓红素,左益强,赵一鸣,等.移动通讯中可证安全的双向认证密钥协商协议[J/OL].软件学报,2003,14(8):14891494.http://www.jos.org.cn/1000-9825/14/1489.htm.
  • 3Wilson B,Johnson D,Menezes A.Key Agreement Protocols and Their Security Analysis[C] //Proceedings of the 6th IMA International Conference on Cryptography and Coding.Heideelberg:Springer-Nerlag,1997,30(45).
  • 4Laurie Law,Alfred Menezes,Minghua Qu,et al.An Efficient Protocol for Authenticated Key Agreement[J].Designs,Codes,and Cryptography,2003,28(2):119-134.
  • 5Bellare M,Rogaway P.Entity authentication and key distribution[C] //Stinson DR.Advances in Cryptology-CRYPTO'93.LNCS 773,Berlin:Springer-Verlag,1993:232-249.
  • 6Diffie W,van Oorschot PC,Wiener MJ.Authentication and authenticated key exchange[C] //Designs,Codes and Cryptography,1992,2:107-125.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部