期刊文献+

认证协议中可信第三方签名的新鲜性漏洞 被引量:1

A Freshness Defect of Trusted Third Party's Signature in Authentication Protocol
下载PDF
导出
摘要 文章提出有可信第三方参与的认证协议中,存在一个第三方签名的新鲜性漏洞,并以NSPK协议、A(0)协议和NS签名协议为例,说明这种漏洞存在的普遍性,同时设计出了相应的攻击方法。最后,分析了这种漏洞产生的原因,并提出了在签名消息中加入时间戳的改进方法。 This paper puts forward a freshness defect of third party's signature in authentication protocol which has trusted third party. Making NSPK protocol, A(0) protocol and NS signature protocol as examples, the universality of this defect and design the corresponding attack methods are proposed. Finally, the cause of this defect is analyzed and the improved scheme is put forward by using timestamp.
出处 《计算机与数字工程》 2011年第7期105-108,共4页 Computer & Digital Engineering
基金 美国GeneChiu基金(编号:GFC2006-001)资助
关键词 认证协议 新鲜性 签名 协议攻击 时间戳 authentication protocol freshness signature protocol attack timestamp
  • 相关文献

参考文献10

  • 1卓继亮,蔺慧丽,李先贤.具有可信第三方的认证协议的安全性[J].计算机应用研究,2004,21(12):109-112. 被引量:4
  • 2Dolev D, Yao A. On the Security of Public Key Proto-cols[J]. IEEE The Transactions on Information Theo-ry,1983,29(2):198-208.
  • 3R. M. Needham, M. D. Sehroeder. Using encryption for authentication of large networks of eomputers[J]. Communications of the ACM, 1978,21 (12) : 9 9 3 -9 9 9.
  • 4Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR[J]. Software-Concepts and Tools, 1996,17(a): 93-102.
  • 5Matsumoto T, Takashima Y, Imai H. On seeking smart public-key distribution systems[J]. Trans. IECE Japan, 1986,69(2) :99-106.
  • 6王贵林,卿斯汉,周展飞.认证协议的一些新攻击方法[J].软件学报,2001,12(6):907-913. 被引量:23
  • 7蔡永泉,朱勇.一种改进的A(0)协议及其形式化分析[J].计算机工程与应用,2006,42(34):109-111. 被引量:3
  • 8DESMEDT Y. Society and group oriented cryptogra phy: a new con-cept[C]//Santa BarBara, CA, USA, 1987:20-127.
  • 9FRANKEL Y. A practical protocol for large group o-riented net-works[C]//Houthalen, Belgium, 1989.-56-61.
  • 10HWANG M, LU E. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosys tem[J]. IEEE Transactions on Knowledge and Data Engineering, 2003,15 (16) : 1552-1560.

二级参考文献17

  • 1范红,冯登国.一个非否认协议ZG的形式化分析[J].电子学报,2005,33(1):171-173. 被引量:8
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3Harkins D, Carrel D. The Internet Key Exchange(IKE), RFC 2409[EB/OL]. http://www.ietf.org/rfc/rfc2409.txt,1998.
  • 4Kohl JT, Neuman BC. The Kerberos Network Authentication Service (v5), RFC 1510[EB/OL].http:// http://www.ietf.org/rfc/rfc1510.txt,1993.
  • 5Clark J, Jacob J. A Survey of Authentication Protocol Literature[EB/OL].http://www.cs.york.ac.uk/jac/papers/drareviewps.ps,1997.
  • 6Dolev D, Yao A. On the Security of Public Key Protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2):198-208.
  • 7Needham R, Schroeder M. Using Encryption for Authentication in Large Networks of Computers[J]. Communications of the ACM, 1978, 21(12):993-999.
  • 8Syverson P. A Taxonomy of Replay Attacks[C].Proc. of 7th IEEE Computer Security Foundations Workshop(CSFW'94), Franconia, New Hampshire, USA: IEEE Computer Society, 1994.187-191.
  • 9Denning D, Sacco G. Timestamps in Key Distribution Protocols[J]. Communications of the ACM, 1981,24(8):533-536.
  • 10Gong L. Variations on the Themes of Message Freshness and Replay[C].Proc. of the Computer Security Foundations Workshop VI, Franconia, New-Hampshire, 1993.

共引文献26

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部