期刊文献+

认证协议中数据同步的分析 被引量:2

Data Synchronization of Authentication Protocols
下载PDF
导出
摘要 认证双方数据的同步是认证协议以及认证密钥交换协议的基本要求,但是在协议设计过程中难以把握且经常被忽视。对近年来可证明安全的一个RFID认证协议和一个RFID认证密钥交换协议以及可证明安全的一个移动卫星通信系统认证密钥交换协议进行了仔细分析,分别发现了针对这些协议的数据同步攻击,这些攻击破坏了协议的可用性。最后分别给出了改进方案,以克服存在的安全隐患。 Data synchronization is a basic rectuirement for authentication protocols and authenticated key exchange protocols, but it is much trickier and many times overlooked. By carefully analyzing an RFID authentication protocol, an RFID anthenticated key exchange protocol,and an authenticated key exchange protocol for mobile satellite communicalion systems which were found to be provably secure at present, attacks of data synchronization to these protocols were found respectively. These attacks destroy the availability of protocols. Furthermore, improvements to overcome the security vulnerabilities of these protocols were proposed.
出处 《计算机科学》 CSCD 北大核心 2010年第3期83-85,共3页 Computer Science
基金 国防科技预研项目资助
关键词 认证协议 数据同步 攻击 安全 Authentication protocol, Data synchronization, Attack, Security
  • 相关文献

参考文献10

  • 1邓淼磊,邱罡,周利华.基于串空间和状态转换的认证协议分析方法[J].计算机科学,2007,34(10):96-98. 被引量:3
  • 2Lee S M, Hwang Y J, Lee D H. Efficient authentication for lowcost RFID systems[C] // International Conference on Computational Science and its Applications. IEEE Computer Society, 2005:619-627.
  • 3Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers [C]//2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops. IEEE Computer Society, 2005 ; 149-153.
  • 4Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer[C]//CIS. 2006: 778-787.
  • 5Ha J,Moon S,Nieto J M G, et al. Low-cost and strong-security RFID authentication protocol[C]//EUC Workshops. 2007:795- 807.
  • 6Deursen T, Radomirovic S. Attacks on RFID protocols [EB/ OL]. http://eprint, iacr. org/2008/310. pdf.
  • 7Canetti R. Universally composable security: A new paradigm for cryptographic protocols[C]//42th IEEE Annual Symposium on Foundations of Computer Science. IEEE Computer Society, 2001 : 136-145.
  • 8Canetti R. Universally composable security: A new paradigm for cryptographic protocols[C]//42th IEEE Annual Symposium on Foundations of Computer Science. IEEE Computer Society, 2001 : 136-145.
  • 9Le T, Burmester M, Medeiros B. Universally composable and forward secure RFID authentication and authenticated key exchange[C]//2nd ACM Symposium on Information, Computer and Communications Security. ACM Press, 2007 : 242 -252.
  • 10冯涛,马建峰.UC安全的移动卫星通信系统认证密钥交换协议[J].宇航学报,2008,29(6):1959-1964. 被引量:9

二级参考文献22

  • 1闵士权.国外卫星通信现状与发展趋势[J].航天器工程,2007,16(1):58-62. 被引量:11
  • 2石东海,唐朝京,张尔扬.基于移动式网络的LEO卫星星座通信网络研究[J].宇航学报,2007,28(1):103-107. 被引量:5
  • 3Ercetin, Ball M O, Tassiulas L. Next generation satellite systems for aeronautical communications [J]. International Journal of Satellite Communications and Networking, 2004,22 (2) : 157 - 179.
  • 4Chang Y F, Chang C C. An efficient authentication protocol for toobile satellite communication systems [J]. ACM SIGOPS Operating Systems Review, 2005,39( 1 ) :70 - 84.
  • 5Cruichshank H S. A secure system for satellite networks[ J]. IEEE Satellite System for Mobile Communication and Navigation, 1996(5): 187- 190.
  • 6Hwang M S, Yang C C, Shiu C Y. An authentication scheme for mobile satellite communication systems [ J]. ACM SIGOPS Operating Systems Review, 2004,37(4) :42 - 47.
  • 7Canetti R, Krawczyk H. Security analysis of IKE's signature-based key-exchange protocol [ EB/OL]. http://eprint. iacr. org/2002/ 120. pdf.
  • 8Canetti R. Universally composable security: A new paradigm for cryptographic protocols[C]//Proceedings of the 42nd IEEE Symposium on the FOCS. New York:IEEE Press, 2001:136- 145.
  • 9Goldreich O, Goldwasser S, Micali S. How to construct pseudo-random functions[J]. Journal of the ACM, 1986,33(4) : 14 - 23.
  • 10Tri Van Le. Mike Burmester and Breno de Medeiros. Forward-secure RFID Authentication and Key Exchange[ EB/OL]. http ://eprint.iacr. org/2007/051, pdf.

共引文献10

同被引文献24

  • 1Juels A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
  • 2Ouafi K, Phan R C. Privacy of recent RFID authentication protocols [C] //Proc of 1SPEC' 08. Berlin: Springer-Verlag, 2008: 263-277.
  • 3Lin J, Oh H, Kim S. A new hash-based RFID mutu al authentication protocol providing enhanced user privacy protection[C]//ISPEC 2008. Berlin: Spring er Verlag, 2008: 278-280.
  • 4Juels A, Weis S. Defining strong privacy ,for RFID [C]// International Conference on Pervasive Computing and Communications. New York: IEEE Comput er Society Press, 2007: 342-347.
  • 5Vaudenay S. On privacy models for RFID[C]//ASIACRYPT 2007. Kuching: Springer-Verlag, 2007: 68-87.
  • 6Ha J, Moon S, Zhou J, et al. A new formal proof model for RFID location privacy[ C] // ESORICS. Berlin: Springer Verlag, 2008:267 281.
  • 7Le T V, Burmester M, Medeiros B. Universally composable and forward secure RFID authentication and authenticated key exchange[C]//ASIACCS' 07. New York: ACM Press, 2007: 242-252.
  • 8Ouafi K, Phan R. Traceable privacy of recent provably-secure RFID protocols [C ] // ACNS 2008. I.NCS 5037. Heidelberg: Springer, 2008: 479-489.
  • 9Deursen T, Radomirovic S. On a new formal proof model for RFID location privacy [J]. Information Processing Letters, 2009, 110(2): 57 -61.
  • 10Moessner M,Khan G N.Secure authenticationscheme for passive C1G2 RFID tags[J].ComputerNetworks,2012,56(1):272-286.

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部