期刊文献+

基于RSA的网关口令认证密钥交换协议 被引量:6

Gateway-Oriented Password-Authenticated Key Exchange Based on RSA
下载PDF
导出
摘要 网关口令认证密钥交换协议是一个三方协议,使得用户和网关在服务器的协助下建立起一个安全的会话密钥,从而实现用户和网关之间的安全通信.已有的网关口令认证密钥交换协议都是基于Diffie-Hellman密钥交换设计的.利用张木想所设计的PEKEP协议,提出了基于RSA体制的可证明安全的网关口令认证密钥交换协议.在随机预言模型下,基于RSA假设证明了协议的安全性.该协议可以抵抗e次剩余攻击和不可检测在线字典攻击. Gateway oriented password based authenticated key exchange (GPAKE) protocal is a three-party protocol, which allows a client and a gateway to establish a common session key with the help of an authentication server. To date, most of the published protocols for GPAKE were based on Diffie-Hellman key exchange. This paper presents the first provably-secure GPAKE protocol using RSA. It is based on the protocol PEKEP of Zhang and is provably-secure in the random oracle model under the RSA assumption. Furthermore, the proposed protocol can resist both e-residue and undetectable on-line dictionary attacks.
出处 《计算机学报》 EI CSCD 北大核心 2011年第1期38-46,共9页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2009AA01Z417) 河南省重点科技攻关项目(092101210502)资助
关键词 RSA 口令认证 网关 随机预言模型 e次剩余攻击 RSA password-based authentication gateway random oracle model e-reside attack
  • 相关文献

参考文献16

  • 1Ding Yun, Horster P. Undetectable on-line dictionary attacks. ACM Operating System, 1995, 29:77-86.
  • 2Bellovin S M, Merritt M. Encrypted key exchange: Pass word-based protocols secure against dictionary attacks//Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, 1992:72-84.
  • 3Patel S. Number theoretic attacks on secure password schemes//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, USA, 1997:236-247.
  • 4Abdalla M, Chevassut O, Fouque P A, Pointcheval D. A simple threshold authenticated key exchange from short seerets//Advanees in Cryptology-Asiacrypt 2005. Chennai, India. LNCS 3788. Berlin: Springe-Verlag, 2005:566-584.
  • 5Abdalla M, Fouque P A, Pointcheval D. Password-based authenticated key exchange in the three party setting//Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography. Les Diablerets, Switzerland, 2005, 65-86.
  • 6Abdalla M, Izabachene M, Pointcheval D. Anonymous and transpanent gateway-based password-authenticated key exchange//Proceedings of the 7th International Conference on Cryptology and Network Security. Hong Kong, Berlin: Springer-Verlag, 2008:133-148.
  • 7Abdalla M, Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password based authentication//Proceedings of the 9th International Conference on Financial Cryptography and Data Security. Roseau, The Commonwealth of Dominica. 2005:341-356.
  • 8Byun J W, Lee D H, Lira J I. Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Communications Letters, 2006, 10 (9) : 683 -685.
  • 9Bellare M, Pointcheval D, Rogway P. Authenticated key exchange secure against dictionary attacks//Advances in Cryp tology-Eurocrypt 2000. Bruges, Belgium. LNCS1807. Berlin: Springer-Verlag, 2000:139 -155.
  • 10Lucks S. Open key exchange: How to defeat dictionary attacks without encrypting public keys//Proceedings of the 5th International Workshop on Security Protocols 1997. Paris, France. 1997:79-90.

同被引文献39

  • 1张琳.基于PKI的电子商务安全研究[J].电子科技大学学报,2009,38(S1):101-103. 被引量:10
  • 2刘悦,刘明业.QR code二维条码数据编码的研究[J].北京理工大学学报,2005,25(4):352-355. 被引量:33
  • 3李宁,罗纪生.基于MPI的不可压缩N-S方程并行计算方法的研究[J].计算机工程与应用,2007,43(9):8-10. 被引量:6
  • 4RAJEEV THAKUR. Test Suite for Evaluating Performance of Multithreaded MPI Communication [ J ]. Parallel Computing, 2009, 35 (12): 561-580.
  • 5DALICIN L, PAZ R, STORTI M, et al. MPI for Python: Performance Improvements and MPI-2 Extensions [J]. Journal of Parallel and Distributed Computing, 2008, 68 (5): 302-313.
  • 6JONCZY J, WUTHRICH M, I-IAENNI R. A probabilistic trust model for GnuPG[ C]//Proc of the 23rd Chaos Communication Congress. Berlin : Chaos Computer Club,2006:61 - 66.
  • 7Abdalla M, Chevassut O, Fouque P A, Pointcheval D. A simple threshold authenticated key exchange from short secrets//Proceedings of the Advances in Cryptology- Asiacrypt 2005. Chennai, India, 2005. LNCS 3788. Berlin: Springer-Verlag, 2005:566-584.
  • 8Byun J W, Lee D H, Lim J I. Security analysis and improve- ment of a gateway-oriented password based authenticated key exchange protocol. IEEE Communications Letters, 2006, 10(9) : 683-685.
  • 9Ding Yun, Horster P. Undetectable on-line dictionary attacks. ACM Operating System, 1995, 29(3): 77-86.
  • 10Shim K A, Cryptanalysis ant/enhancement of modified gate- way-oriented password-based authenticated key exchange protocol. IEICE Transactions on Fundamentals, 2008, E91 A(12) :3837-3839.

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部