期刊文献+

一种基于身份认证的密钥协商模型

A Key Agreement Model based on Identity Authentication
原文传递
导出
摘要 利用通信双方密码设备的身份特征和共享密钥,提出了一种基于身份认证的密钥协商模型,采用与时间戳机制相绑定的分组密码算法、杂凑算法加密体制,定义了密码设备进行密钥协商的工作流程,按此流程进行双方通信密钥的按需协商以及共享密钥的实时有效更新,保证了密钥协商过程的机密性、完整性、防重放性和不可预测性,为某些应用模式下密码设备的安全密钥交换提供了一种有效实用的技术手段。 With the identity features and sharing keys of both the communication parties' crypto equipments, a key agreement model based on identity authentication is proposed. With ciphering systems of block crypto algorithm bound with time stamp and harsh algorithm, the working flow of key agreement of crypto equipments is defined, and with this flow, the on-demand agreement of both parties' communication key and the real-time update of sharing key are realized, thus to guarantee the confidentiality, integrity, anti-replay and unpredictability of the key agreement process and provide an effective technical means for secure key exchange of crypto equipments in certain application mode.
机构地区 中国人民解放军
出处 《信息安全与通信保密》 2012年第12期116-117,120,共3页 Information Security and Communications Privacy
关键词 身份认证 密钥协商 时间戳 identification authentication key negotiation timestamp
  • 相关文献

参考文献5

二级参考文献15

  • 1刘勃,周荷琴.基于贝叶斯网络的网络安全评估方法研究[J].计算机工程,2004,30(22):111-113. 被引量:15
  • 2蔡昱,张玉清,冯登国.基于GB17859-1999标准体系的风险评估方法[J].计算机工程与应用,2005,41(12):134-137. 被引量:4
  • 3李娟,梁军,李永杰.信息安全风险评估研究[J].计算机与数字工程,2006,34(11):64-66. 被引量:11
  • 4王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:57
  • 5ORTALO Rodolphe, DESWARTES Yves, KAANICHE Mohamed. Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security[J]. IEEE Transactions on Software Engineering, 1999 25(5): 633-650.
  • 6THOMAS R P.Information Security Risk Analysis[M].[s.l.]:CRC Press LLC,2001.
  • 7LUONG T N,ZHAO Liping,BILL Applebee.A Set Approachto RoleModelingTechnology of Object-OrientedLanguages and Systems[C].USA:IEEE,2000:158-169.
  • 8The Basle Commitlee.Operational Risk ManagementTechnology[S].[s.l.]:Risk Monitor,2002.
  • 9WRIGHT M.Third Generation Risk ManagementPractices[J].Computer Fraud&Security,1999(02):9-11.
  • 10NIST.Risk Management Guide for InformationTechnology Systems[EB/OL].(2001-09-01)[2011-09-08].http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf.

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部