期刊文献+

认证的密钥交换协议及SVO逻辑证明

Authenticated Key Exchange Protocol and Verification SVO Logic
原文传递
导出
摘要 在环境受限的无线通信网络环境中,身份认证和会话密钥的协商是确保通信双方能否建立安全会话的关键。为使认证和密钥建立协议中采用的密码技术能适合受限通信环境中的应用,提出一个基于身份的认证的密钥建立协议,并使用SVO逻辑证明设计协议的安全目标。 In a distributed wireless communication network, authenticated key agreement protocol is critical to the secure sessions between communication parties, and much attention is paid to formal theories of cryptographic protocol analysis. A Mutually-Authenticated Key Establish Protoeol(AKEP) based on entity authentication with elliptic curve cryptography is proposed, which could provide data confidentiality of exchanged information between Server and client via symmetric cryptography. The security of the protocol is verified by SVO logic.
作者 刘志猛
出处 《通信技术》 2009年第12期73-75,共3页 Communications Technology
基金 国家自然科学基金(60773053)
关键词 安全协议 密钥交换 逻辑分析 security protocol key exchange logic analysis
  • 相关文献

参考文献7

  • 1Aydos M, Sunar B, Koe C K. An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication[C]. USA: In 2^nd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications. 1998.
  • 2赵锐,马云霞,赵国亮,刘山杉.IKE协议防止中间人攻击性能分析及改进[J].通信技术,2009,42(5):238-240. 被引量:1
  • 3LIU Zhimeng ZHAO Yanli FAN Hui.A Secure MAKAP for Wireless Communication[J].Wuhan University Journal of Natural Sciences,2006,11(6):1749-1752. 被引量:3
  • 4Shim K. Cryptanalysis of Mutual Authentication and Key Exchange for Low Power Wireless Communications[J]. IEEE Communication Letter, 2003(05):248-250.
  • 5Syverson P F, Vanoorscho P C. On Unifiing Some Cryptographic Protocol Logics[C]//In: Proceedings of the 1994 IEEE Computer Society Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1994: 14-28.
  • 6Syverson P F, Vanoorscho P C. A Unified Cryptographic Protocol Logics[M], Naval Research lab, 1996.
  • 7卿斯汉.安全协议的设计与逻辑分析[J].软件学报,2003,14(7):1300-1309. 被引量:69

二级参考文献17

  • 1卫剑钒,唐礼勇,陈钟.IKE协议两种身份保护缺陷的改进[J].计算机工程与应用,2004,40(26):33-36. 被引量:6
  • 2RFC2409, The Internet Key Exchange(IKE)[S].1998.
  • 3RFC2408, Internet Security Association and Key Management Protocol(ISAKMP)[S].1998.
  • 4Whitfield Diffie,Paul C. Oorschot,Michael J. Wiener.Authentication and authenticated key exchanges[J].Designs Codes and Cryptography.1992(2)
  • 5Diffie W,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchanges[].Designs Codes and Cryptography.1992
  • 6Koblitz N.Elliptic curve cryptosystems[].Mathematics of Computation.1987
  • 7V.S. Miller.use of elliptic curve in cryptography[].CRYPTO.1985
  • 8Sun H. M,Hsieh B. T,Tseng S. M.Cryptanalysis of Aydos etal.’s ecc-based wireless authentication protocol[].Proceedings of the IEEE International Conference on e-Technology e-Commerce and e-Service.2004
  • 9Aydos M,Sunar B.An Elliptic Curve Cryptography Based Authentication and Key Agreement Protocol for Wireless Communication [ EB/OL]. http:// www. crypto. wpi.edu/ Publications / Documents/ask-98-an.pdf . 2005
  • 10Aydos M,Savas E.Implementing Network Security Proto- cols Based on Elliptic Curve Cryptography. http:// www.christianroepke.de/ studium/asy- krypto/gf2-ecc-pdf . 2005

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部