期刊文献+

一种改进的基于移动通信的论证密钥协商协议——MAKAP^+

AN IMPROVED MUTUALLY AUTHENTICATED KEY AGREEMENT PROTOCOL——MAKAP^+ BASED ON MOBILE COMMUNICATION
下载PDF
导出
摘要 针对移动通信中的可证安全的双向密钥认证协议MAKAP协议的缺陷——不能抵御未知密钥共享攻击,给出了一个改进后的MAKAP+协议,在随机预言机模型中证明了本协议的安全性。改进后的协议不使用任何加密解密算法,具有更高的可靠性。通过性能分析,证明了此协议的实用性。 A security-provable mutually authenticated key agreement protocol—MAKAP of mobile communication has security flaw:it can not resist unknown key-share attack.To solve this problem,this paper proposes an improved protocol—MAKAP+ protocol.In the random oracle model,this protocol has been proved its security.The improved protocol doesn't depend on any encoding/decoding algorithm and is more reliable.Through the analysis of its performance,the practicality of MAKAP+ protocol has been proved.
作者 丁辉 殷新春
出处 《计算机应用与软件》 CSCD 2010年第6期17-19,共3页 Computer Applications and Software
基金 国家自然科学基金项目(60473012) 国家高技术研究发展计划基金项目(2007AA012448)
关键词 认证密钥协商协议 未知密钥共享攻击 随机预言机模型 Authenticated key agreement protocol Unknown key-share attack Random oracle model
  • 相关文献

参考文献7

  • 1邓红素,左益强,赵一鸣,等.移动通讯中可证安全的双向认证密钥协商协议[J/OL].软件学报,2003,14(8):14891494.http://www.jos.org.cn/1000-9825/14/1489.htm.
  • 2周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 3张亚娟,李景峰,祝跃飞.对MAKAP协议的攻击及其改进[J].计算机工程,2007,33(13):22-24. 被引量:1
  • 4Wilson B,Johnson D,Menezes A.Key Agreement Protocols and Their Security Analysis[C] //Proceedings of the 6th IMA International Conference on Cryptography and Coding.Heideelberg:Springer-Nerlag,1997,30(45).
  • 5Laurie Law,Alfred Menezes,Minghua Qu,et al.An Efficient Protocol for Authenticated Key Agreement[J].Designs,Codes,and Cryptography,2003,28(2):119-134.
  • 6Bellare M,Rogaway P.Entity authentication and key distribution[C] //Stinson DR.Advances in Cryptology-CRYPTO'93.LNCS 773,Berlin:Springer-Verlag,1993:232-249.
  • 7Diffie W,van Oorschot PC,Wiener MJ.Authentication and authenticated key exchange[C] //Designs,Codes and Cryptography,1992,2:107-125.

二级参考文献7

  • 1Diffie W,Hellman M.New Directions in Cryptography[J].IEEE Transcations on Information Theory,1976,22(6):644-654.
  • 2Matsumoto T,Takashima Y,Imai H.On Seeking Smart Public-key Distribution Systems[J].Transcations of the IECE of Japan,1986,E69(2):99-106.
  • 3Law L,Menezes A,Qu M,et al.An Efficient Protocol for Authenticated Key Agreement[Z].2003.http://www.cacr.math.uwater loo.ca.
  • 4National Security Agency.SKIPJACK and KEA Algorithm Specification[Z].1998.http://csrc.nist.gov/encryption/skipjack-kea.htm.
  • 5Wilson B,Johnson D,Menezes A.Key Agreement Protocols and Their Security Analysis[C]//Proceedings of the 6th IMA International Conference on Cryptography and Coding.Heidelberg:Springer-Verlag,1997:30-45.
  • 6Bellare M,Rogaway P.Entity Authentication and Key Distribution[C] //Proceedings of the CRYPTO'93.Heidelberg:Springer-Verlag,1994:232-249.
  • 7邓红素,左益强,赵一鸣,鲍振东.移动通信中可证安全的双向认证密钥协商协议[J].软件学报,2003,14(8):1489-1494. 被引量:14

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部