期刊文献+

可信计算环境下的Canetti-Krawczyk模型 被引量:2

The Canetti-Krawczyk Model Under the Trusted Computation
下载PDF
导出
摘要 在可信环境下,我们对密钥协商协议的形式化方法—Canetti-Krawczyk(CK)模型进行研究,对该模型中定义的攻击者三种攻击能力重新进行分析.发现在可信环境下,如果用户的签名/验证公私钥对是由TPM生成的,则CK模型中的攻击者只有一种攻击能力:会话密钥查询(session-key query);否则攻击者有两种攻击能力:会话密钥查询和一种新的攻击能力—长期私钥攻陷攻击(long-termprivate key corruption).另外,TPM克服了CK模型中基于加密算法认证器的安全缺陷.在此基础上,我们提出了可信环境下的CK模型—CKTC.之后,通过一个使用CKTC模型进行密钥协商的例子可以看出该模型简化了可信环境下密钥协商协议的设计与分析.另外,通过分析我们发现:为了提高密钥协商协议的安全性,不同国家应该根据各自的需要在TPM内部增加对称加解密模块;用户的签名/验证公私钥对也尽可能由TPM来生成. Under the trusted environment, we rethink the three attack abilities defined in the Canetti-Krawczyk (CK) model which is a formal method for the design and analysis of key agreement protocols. We find that under the masted environment if the signatture/verification key pair is generated by TPM, the attacker in the CK model has only one attack ability: session-key query. Otherwise,he has two abilities: session-key query and one new attack ability: long-term private key corruption. In addition, TPM overcomes the weakness of the encryption algorithm based authenticator in the Canetti-Krawczyk model. Based on these, we pro- posed a new CK model under the trusted environment--CKTC. Thereafter, through an example of utilization of CKTC to design a key-agreement protocol, it can be seen that this formal model predigests the difficulty of the design and analysis a key-agreement protocol under trusted environment. In addition, we find that in order to enhance the security of a key agreement protocol, every country should add their own symmetric encryption modules in the TPM, and a user' s signature/verification key pair should be generated by TPM.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第1期7-12,共6页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2007AA01Z429,2007AA01Z405,2007AA01Z472) 国家自然科学基金重点项目(No.60633020) 国家自然基金(No.60702059,60573036) 华为公司科技基金(No.YJCB2008053MT) 天津科技攻关计划(No.06YFGZGX17500)
关键词 可信计算 Canetti—Krawczyk模型 trusted computation Canetti-Krawczyk model
  • 相关文献

参考文献17

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 3S Pearson. Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy [A]. In Proc. iTrust' 05[C]. Rocquencourt: Springer Press, 2005. 305 - 320.
  • 4S Hilley. Trusted computing--path to security or road to servitude? [J] .Infosecurity Today,2004.1(4) :18- 21.
  • 5D Safford, Mimi Zohar. Trusted computing and open source [ J ]. Information Security Technical Report 2005,10(2) : 74 - 82.
  • 6B Berger. Trusted computing group history[J]. Information Security Technical Report.2005,10(2) :59 - 62.
  • 7L law, A Menezes, M Qu, et. al. An efficient protocol for authenticated key agreement[J ]. Designs, Codes and Cryptography. 2003,28(2) : 119 - 134.
  • 8A Menezes, P vanOorschot, S Vanstone. Handbook of Applied Cryptography[M]. Boca Raton, USA: CRC Press, 1996. 489 - 541.
  • 9E Bresson, O Chevassut, D Pointcheval. New security results on encrypted key exchange [ A ]. In Proc. PKC' 2004 [ C ]. Singapore: Springer Press,2004.145 - 158.
  • 10W Aiello, S M Bellovin, M Blaze. Efficient, DoS-resistant, secure key exchange for intemet protocols [A]. In Proc. CCS' 2002[ C]. Washingtion, DC, USA: ACM Press, 2002.45 - 58.

二级参考文献44

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 3Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 4Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 5Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 6International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 7Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 8Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743
  • 9Michael Atighetchi, Partha Pal et al.. Adaptive cyberdefense for survival and intrusion tolerance. IEEE Internet Computing, 2004, 8(6): 25~33
  • 10Anderson R.J.. Cryptography and competition policy -issues with trusted computing. In: Proceedings of the PODC'03, Boston, Massachusetts, 2003, 13~16

共引文献285

同被引文献10

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部