期刊文献+

新的基于椭圆曲线的三方口令认证密钥协商协议 被引量:2

New three-party password-based authenticated key agreement protocol with elliptic curve
下载PDF
导出
摘要 口令认证密钥协商使得参与通信的用户用一个低熵的口令就可以实现实体认证,并能通过不安全的信道安全地生成共享的高熵会话密钥。为此,设计了一种新的基于椭圆曲线的三方口令认证密钥协商协议,新协议将参与者的口令巧妙地隐藏在传输的消息中,确保了口令的安全性。新协议的安全性基于椭圆曲线离散对数问题,服务器并不需要完全可信。安全性分析和性能分析显示,新协议以较低的代价实现了通信双方的安全通信。 Password-based Authenticated Key Agreement(PAKA) protocols allow parties sharing only a low-entropy,human-memorable password to authenticate them and establish a common session key over an insecure channel in a secure manner.A new three-party password-based authenticated key agreement protocol based on the elliptic curve was proposed in this paper.The new protocol skillfully hid the password of each participant into the messages to ensure the security of passwords.The security of the new protocol was based on the discrete logarithm on elliptic curve,and the server did not need to be completely trusted.The results of security analysis and efficiency analysis show that the new protocol realizes the secure communications under the low computational cost.
出处 《计算机应用》 CSCD 北大核心 2011年第10期2687-2688,2691,共3页 journal of Computer Applications
关键词 信息安全 密钥协商 口令 椭圆曲线 information security key agreement password elliptic curve
  • 相关文献

参考文献10

  • 1BELLOVIN S, MERRITT M. Encrypted key exchange: Password based protocols secure against dictionary attacks [ C]//Proceedings of 1992 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE Press, 1992:72 -84.
  • 2GONG L. Optimal authentication protocols resistant to password guessing attacks [ C] // Proceedings of the 8th IEEE Workshop on Computer Security Foundations. Piscataway, NJ: IEEE Press, 1995:24 -29.
  • 3BELLARE M, ROGAWAY P. Provably secure session key distribu-tion- The three party case [ C]// Proceedings of the 27th ACM Symposium on Theory of Computing. New York: ACM Press, 1995: 57 - 66.
  • 4LIN HUNLI, SUN HUNGMIN, HWANG T. Three-party encrypted key exchange: attacks and a solution [ J]. Operating Systems Re- view, 2000, 34(4) : 12 -20.
  • 5LIN CHUNLI, SUN HUNGMIN, STEINER M, et al. Three-party encrypted key exchange without server public key [ J]. IEEE Com- munications Letters, 2001,5(12) : 497 -499.
  • 6CHANG C, CHANG Y. A novel three-party encrypted key exchange protocol [J]. Computer Standards and Interfaces, 2004,26(5):471 - 476.
  • 7CHEN T, LEE W, CHEN H. A round-and computation-efficient three-party authenticated key exchange protocol [ J]. Journal of Sys- tems and Software, 2008, 81(9) : 1581 - 1590.
  • 8LO N, YEH K. Cryptanalysis of two three-party encrypted key ex- change protocols [ J]. Computer Standards and Interfaces, 2009, 31 (6) : 1167 - 1174.
  • 9AYDOS M, SAVAS E, KOV C. Implementing network security pro- tocols based on elliptic curve cryptography [ EB/OL]. [ 2011 -01 - 01]. http://citeseerx, ist. psu. edu/viewdoc/download?doi = 10.1. 1.23.1138&rep = repl &type = pdf.
  • 10隋爱芬,杨义先,钮心忻,罗守山.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,27(3):28-32. 被引量:27

二级参考文献9

  • 1Miller V S.Use of elliptic curves in cryptography[A].Advances in Cryptology Crypto 85[C].Lecture Notes in Computer Science,1985,(128):417-426.
  • 2Koblitz N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
  • 3Aydos M,Sunar B,Koc C K.An elliptic curve cryptography based authentication and key agreement protocol for wireless communication[A].The Second International Workshop on Discrete Algorithm and Methods for Model Computation and Communication[C].Dallos,1998
  • 4Dong Hwi Seo,Sweeney P.Simple authenticated key agreement algorithm[J].Electron Lett,1999,35(13):1 073-1 074.
  • 5Ku W C,Wang S D.Cryptanalysis of modified authenticated key agreement protocol[J].Electronics Letters,2000,36(21):1 770-1 771.
  • 6Hsieh B T,Sun H M,Hwang T.Cryptanalysis of enhancement for simple authentication key agreement algorithm[J].Electronics Letters,2002,38(1):20-21.
  • 7Diffie W,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchanges[J].Des Codes Cryptography,1992,(2):107-125.
  • 8Bellovin S M,Merritt M.Encrypted key exchange:password-based protocols secure against dictionary attacks[A].Proc 1992 IEEE Computer Society Conf on Research in Security and Privacy[C].1992.72-84.
  • 9Menezes A J,van Oorschot P C,Vanstone S A.Handbook of applied cryptography[M].CRC Press,1997.496.

共引文献26

同被引文献20

  • 1王海涛 ,刘晓明 .Ad hoc网络的安全问题综述[J].计算机安全,2004(7):26-30. 被引量:6
  • 2王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 3McDonald A B,Znati T F.A mobility-based framework for adaptive clustering in wireless ad hoc networks[J].IEEE Journal on Selected Areas in Communications,2006,17(8):1466-1487.
  • 4Zhou L D,Haas Z J.Securing ad hoc networks[J].IEEE Network,1999,13 (6):24-30.
  • 5Asokan N,Ginzboorg P.Key agreement in ad hoc networks[J].Computer Co mmunications,2000,23(17):1627-1637.
  • 6Ertaul L,Chavan N.Security of ad hoc networks and threshold cryptography[C]//Proceedings of the IEEE 2005 International Conference on Wireless Networks,Communications and Mobile Computing.2005,1:69-74.
  • 7Ertaul L,Lu W M.ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (Ⅰ)[C]// Proceedings of the 4th IFIP-TC6 International Conference on Networking Technologies,Services,and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems.2005:102-113.
  • 8Bellare M,Rogaway P.Entity authentication and key distribution[C]//Proceedings of the 13th Annual Intemational Cryptology Conference on Advances in Cryptology.1994:232-249.
  • 9Bellare M,Pointcheval D,Rogaway P.Authenticated key exchange secure against dictionary attacks[C]//Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques.2000:139-155.
  • 10Hu Ronglei,Chi Yaping,Xu Fenglin,et al.A passwordauthenticated key agreement scheme for ad hoc networks[C]// Proceedings of the 5th International Conference on Wireless Communications,Networking and Mobile Computing.2009:2943-2947.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部