期刊文献+

结合公钥密码的密钥协商协议

Key agreement protocol combine with public key cryptography
下载PDF
导出
摘要 针对目前公钥密码体制的计算代价大,并且需要一个可信的数字证书认证机构才能保证密码体制的安全性,同时证书的维护也是安全方面的隐患等问题,提出一种结合动态公钥密码的密钥协商协议.在认证阶段,将生成的随机数同双方事先约定好的信息串接起来计算其哈希值,把此哈希值和随机数一同发送给对方,哈希函数的单向性使得该随机数能够被正确地传输.在加解密阶段,通过结合对方传输过来的随机数来动态改变公钥算法的密钥对,以实现通信过程中的一次一密.相比传统的通过重新生成大素数来改变密钥对的方法提高了效率,最后通过三种最常用的网络攻击手段验证了协议的安全性. Aiming at the problems that computational cost of the public key infrastructure is large and a trusted certificate authority is prerequisite to ensure the security of the cryptosystem, the maintenance of the certificate is also the hidden danger, a key agreement protocol combined with a dynamic public key cryptography was proposed. During the authentication phase ,the prior shared information and the random number which generated by sender were concatenated and calculated their hash values, then, the hash values and the random number were transmitted to the receiver, the unidirectional hash function ensures the random number being transmitted correctly. During the encryption and decryption phase, the random numbers transmitted from each other was used to change keys of public key algorithm dynamically. This method achieves the one-time pad in the communication, it makes more efficiency than the method which regenerates the large prime numbers to change the keys. The safety of this agreement is verified by using three techniques which are commonly used on the network attack.
出处 《武汉工程大学学报》 CAS 2012年第11期65-67,共3页 Journal of Wuhan Institute of Technology
关键词 公钥密码 密钥协商协议 一次一密 public key cryptography~ key agreement protocol~ one-time pad
  • 相关文献

参考文献7

二级参考文献15

  • 1金晨辉,高海英.对两个基于混沌的序列密码算法的分析[J].电子学报,2004,32(7):1066-1070. 被引量:28
  • 2Xiang T,Liao X F,Tang G P,et al.A novel block cryptosystem based on iterating a chaotic map[J].Physics Letters A,2006(349):109-115.
  • 3Wang King-yuan,Yu Cang hai.Cryptanalysis and improvement on a cryptosystem based on a chaotic map[J].Computers and Mathematics with Applications,2009(57):476-482.
  • 4张焕国,计算机科学,1998年,4期,68页
  • 5卢开澄,计算机密码学,1990年
  • 6徐寿怀, 张根度, 朱洪. On the Security of Cryptographic Protocols. 第五届中国密码学学术会议论文集, 1998
  • 7Syverson P. A Taxonomy of Replay Attacks. In: Proceedings of the 7th IEEE Computer Security Foundations Workshop, 1994:131-136
  • 8Clark J, Jacob J. A Survey of Authentication Protocol Literature. http://www.cs.york.ac.uk/~jac/papers/drareviewps. ps, 1997
  • 9Lowe G. Some New Attacks upon Security Protocols. In: Proceedings of the Computer Security Foundations Workshop Ⅷ.IEEE Computer Society Verlag, 1996
  • 10胡端平,唐超.一致矩阵的特征性质[J].武汉工程大学学报,2009,31(5):93-94. 被引量:2

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部