期刊文献+

新的口令认证密钥协商协议 被引量:6

A New Password-Based Authenticated Key Agreement Protocol
下载PDF
导出
摘要 针对服务器泄漏攻击,给出了抵抗这种攻击的方法,提出了一个新的基于口令的认证密钥协商协议。在该方案中,用户记住自己的口令,而服务器仅仅存储与口令对应的验证信息。分析结果表明,该方案可以抵抗服务器泄漏攻击、字典攻击和Denning-Sacco攻击等,并且具有前向安全性等性质。 Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed. In this protocol, one side (the client) stores a plaintext version of the password, while the other side (the server) only stores a verifier for the password. The analysis of this new protocol shows that the protocol is secure against server compromise attack, dictionary attack,and the Denning-Sacco attack, and provides the property of the perfect forward secrecy.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2008年第1期17-19,共3页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60473027)
关键词 字典攻击 密钥协商 口令认证 服务器泄漏攻击 dictiona y attack key agreement password authentication server compromise attack
  • 相关文献

参考文献11

  • 1BELLOVIN S, MERRITT M. Encrypted key exchange: password-based protocols secure against dictionary attacks[C]//Proceedings of the IEEE Symposium on Research in Security and Privacy. Oakland: IEEE Computer Society, 1992: 72-84.
  • 2BELLOVIN S, MERRITT M. Augumented encrypted key exchange:a password-based protocol secure against dictionary attacks and password file compromise[C]// Proceedings of CCS'93. New York: ACM Press, 1993: 244-250.
  • 3JABLON D. Strong password-only authenticated key exchange[J]. ACM Computer Communication Review, 1996, 26(5): 5-20.
  • 4BELLARE M, POINTCHEVAL D, ROGAWAY E Authenticated key exchange secure against dictionary attacks[C]//Advances in Cryptology-EUROCRYPT'00. Bruges & Belgium: Springer-Verlag, 2000.
  • 5BOYKO V, MACKENZIE P, PATEL S. Provably-secure password anthentiation and key exchange using Diffie-Hellman[C]//EUROCRYPI2000. Bruges,Belgium: Springer-Verlag,2000.
  • 6KATZ J, OSTROVSKY R, YUNG M. Efficient password- authenticated key exchange using human-memorable passwords[C]//EUROCRYPT 2001. Berlin: Springer-Verlag,2001.
  • 7Raimondo M, Gennaro R. Provably secure thre-shold password-authenticated key exchange[C]//EUROCRYPT 2003. New York: Springer-Verlag, 2003.
  • 8GENNARO R, LINDELL Y. A framework for password- based authenticated key exchange[C]//EUROCRYPT2003. New York: Springer-Verlag. 2003.
  • 9BRESSON E, CHEVASSUT O, POINTCHEVAL D. New security results on encrypted key exchange[C]//PKC2004. Singapore: Springer-Verlag, 2004.
  • 10LEE S W, KIM W H, KIM H S, et at. Efficient password-based authenticated key agreement protocol[C]// ICCSA'04. Perugia: Springer-Verlag, 2004.

同被引文献50

  • 1杨建萍,周贤伟,杨军.基于阈下信道技术的身份认证机制研究[J].微电子学与计算机,2004,21(12):195-197. 被引量:4
  • 2殷胤,李宝.标准模型下可证安全的加密密钥协商协议[J].软件学报,2007,18(2):422-429. 被引量:9
  • 3冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学(E辑),2007,37(2):223-237. 被引量:14
  • 4OBRACZKA K, TSUDIK G. Pushing the limits of multicast in Ad hoc networks[C]//Proceedings of the 21th International Conference on Distributed Computing System. Washington, DC, USA: IEEE Computer Society , 2001: 719-722.
  • 5ZHOU L, HASS Z J. Securing Ad hoe networks[J]. IEEE Network Magazine, 1999, 13(6): 24-30.
  • 6BELLOVIN S, MERRITT M. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise[C] //Proceedings of the 1st ACM Conference on Computer and Communication Security. New York, USA: ACM Press, 1993: 244-250.
  • 7BELLARE M, POINTCHEVAL D, Authenticated key exchange secure against dictionary attacks[C]//Eurocrypt 2000, LNCS1807. Berlin: Springer- Verlag, 2000: 139-155.
  • 8BOYKO D, MACKENZIE P, PATEL S. Provably secure password-authenticated key exchange using diffie-Hellman [C]//Proceediings of Eurocrypt'01, LNCS1807. Berlin: Springer-Verlag, 2001: 156-171.
  • 9GOLDREICH O, LINDELL Y. Session-key generation using human passwords only[C]//Procecdings of Crypto'01, LNCS2139. Berlin: Springer-Verlag, 2001:408-432.
  • 10BECKER K, WILLE U. Communication complexity of groupkey distribution[C]//Proc of the 5th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 1998: 1-6.

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部