期刊文献+

一种无线认证密钥协商协议 被引量:6

Wireless Authenticated Key Agreement Protocol
下载PDF
导出
摘要 提出一种新的无线局域网认证密钥协商协议,可以提供双方相互认证及密钥确认。该协议在密钥设置上基于挑战响应协议和KAS方案,在密钥预分配上基于Diffie-Hellman协议,可以提供完美前向安全性,抵抗被动攻击、字典攻击、中间人攻击、假冒攻击等。并对协议的计算代价和通信代价进行分析。 This paper puts forward a new authenticated key agreement protocol for Wireless Local Area Network(WLAN), which provides secure mutual authentication, key establishment and key confirmation. It can resist dictionary attacks by either passive or active networks intruder, man-in-the middle attack, and impersonate attack. It also offers perfect forward secrecy. The protocol combines techniques of challenge response protocols with symmetric key agreement protocols. Both computational and communication performance are analyzed.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第7期142-143,149,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2007AA012447) 北京市教育委员会科技计划基金资助项目(KM200810037001) 北京市属高等学校人才强教计划基金资助项目(PHR-IHLB) 北京市教育委员会科研基地建设基金资助项目
关键词 密钥协商协议 无线局域网 挑战响应协议 key agreement protocol Wireless Local Area Network(WLAN) challenge response protocol
  • 相关文献

参考文献5

  • 1赵宗渠,刘艳霞.一种可证安全性的无线网络密钥协商协议[J].计算机工程,2008,34(14):174-175. 被引量:1
  • 2Hideki I, Seonghan S, Kobara K. Authenticated Key Exchange for Wireless Security[C]//Proc. of IEEE Wireless Communications & Networking Conference. Tokyo, Japan: IEEE Computer Society, 2005.
  • 3Mackenzie E More Efficient Password Authenticated Key Exchange[C]//Proc. of the 2001 Conference on Topics in Cryptology. London, UK: Springer-Verlag, 2001.
  • 4Ryu Eun-Kyung, Kim Kee-Won, Yoo Kee-Young. A Simple Key Agreement Protocol[C]//Proc. of the 37th Annual International Carnahan Conference. Taipei, China: IEEE Computer Society, 2003.
  • 5Blake-Wilson S, Johnson D, Menezes A. Key Agreement Protocols and Their Security Analysis[C]//Proc. of the 6th IMA International Conference on Cryptography and Coding. [S. l.]: Springer-Verlag, 1997.

二级参考文献5

  • 1周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 2Bellare M, Rogaway E Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols[C]//Proc. of the 1st ACM Conf. on Computer and Communications Security. New York, USA: ACM Press, 1993.
  • 3Wilson S B, Johnson D, Menezes A. Key Agreement Protocols and Their Security Analysis[C]//Proc. of the 6th Int'l Conf. on Crypotography and Coding. Berlin, Germany: Springer-Verlag, 1997.
  • 4Bellare M, Rogaway P. Entity Authentication and Key Distribution[C]//Proc, of CRYPTO'93. Berlin; Germany: Springer-Verlag, 1993.
  • 5邓红素,左益强,赵一鸣,鲍振东.移动通信中可证安全的双向认证密钥协商协议[J].软件学报,2003,14(8):1489-1494. 被引量:14

同被引文献51

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部