期刊文献+

基于ECC算法的TLS协议设计与优化 被引量:6

Design and optimization of TLS protocol based on ECC
下载PDF
导出
摘要 为解决TLS协议存在的握手交互次数多、密钥计算开销大等诸多性能问题,在对TLS协议进行分析的基础上,设计了一种基于ECC算法的TLS协议,用ECC算法代替原协议中的RSA算法,充分发挥ECC算法的优越性,提高协议的性能。使用缓存握手参数的方法对协议交互过程进行优化,通过SVO逻辑对优化后的协议进行形式化证明,证明协议是安全的。通过实验将改进后的协议与原协议进行了比较分析,结果表明,随着协议安全等级的提高,改进后的协议在性能上具有明显的优越性。 In order to improve efficiency flaws of TLS protocol such as frequent interaction times and high computation over-load,through the analysis and research on the protocol,this paper proposed a new ECC-based protocol in which RSA was sub-stituted by ECC.It improved the new protocol performance.Through cache handshake parameters,the number of shake hands interaction was less.It used SVO logic to analyze ECC-based protocol,and the result shows that it is secure.The simulation experiment and comparison with original protocol show that with the increased level of security,the new ECC-based protocol is more predominant.
出处 《计算机应用研究》 CSCD 北大核心 2014年第11期3486-3489,共4页 Application Research of Computers
基金 国家"863"计划资助项目(61303074)
关键词 椭圆曲线密码 RSA算法 TLS协议 安全分析 ECC RSA algorithm TLS protocol security analysis
  • 相关文献

参考文献13

二级参考文献74

  • 1彭长艳,张权,唐朝京.基于IBC的TLS握手协议设计与分析[J].计算机应用,2009,29(3):633-637. 被引量:9
  • 2路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 3Dierks T, Alien C. The TLS Protocol Version 1.0[S]. RFC 2246, 1999-01.
  • 4Shamir A. Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of Cryptology-Crypto'84. New York, USA: Springer-Verlag, 1984: 47-53.
  • 5Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing[C]//Proceedings of Cryptology-Crypto'01. Berlin, Germany: Springer-Verlag, 2001: 213-229.
  • 6Gentry C, Silverberg A. Hierarchical ID-based Cryptography[C]// Proceedings of AsiaCrypt'02. Berlin, Germany: Springer-Verlag, 2002: 548-566.
  • 7Burrows M, Abadi M, Needham R. A Logic of Authentication[R]. Digital Systems Research Center, Tech. Rep.: 39, 1989.
  • 8Freier Alan O, Philip Karlton, Kocher Paul C. The SSL protoool version 3. 0[EB/OL]. [2010-06-30]. http.//www. mozilla. org/projects/ security/pld/nss/ ssl/ draft302, txt.
  • 9Dierks T, Certicom, Allen C, et al. The TLS protocol version 1.0[EB/OL]. [2010-06-30]. http://www. ietf. org/rfc/rfc2246, txt.
  • 10OpenSSL[EB/OL]. [2010-06-30]. http://www. openssl, org.

共引文献39

同被引文献48

  • 1张梅,张红旗,杜学绘.基于PKI的SSL协议的描述及安全性分析[J].微计算机信息,2006(12X):51-53. 被引量:10
  • 2Zhao Huawei, Liu Ruixia. A scheme to improve security of SSL[C/OL]//IEEE Pacific-Asia Conference on Cir- cuits, Communications and Systems, Chengdu, China, May 16-17, 2009. [2015-02-11]. http://ieeexplore.ieee org/stamp/stamp.jsp?tp=l~arnumber=-5232371.
  • 3Tutanescu I, Anton C, Iionescu L, et al. Elliptic curves cryptosystems approaches[C/OL]//IEEE International Conference on Information Society (i-Society), London, UK, June 25-28, 2012. [2015-02-12]. http://ieeexplore. ieee.org/stamp/stamp.jsp ?tp=~amumber=6284992.
  • 4Shanmugalakshmi D R, Prabu M. Research issues on elliptic curve cryptography and its applications[J]. Interna- tional Journal of Computer Science and Network Security, 2009, 9(6):19-22.
  • 5Wang Zhenzhong, Wang Yao. An Improvement SSL Protocol Application Research[C/OL]//IEEE International Conference on Electronic I~ Mechanical Engineering and Information Technology, Harbin, Heilongiiang, Aug 12- 14, 2011. [2015-02-12]. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=~amumber=-6023898.
  • 6Saito T, Umesawa K, Kito T, et al. Privacy-enhanced SPKI access control on PKIX and its application to web server[C/OL]//IEEE 17th International Conference on Advanced Information Networking and Applications, Xi'an, China, March 27-29, 2003. [2015-02-13]. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=~arnumber=1192970.
  • 7何剑辉.基于ECC的RFID双向认证协议的研究[D].西安:西安电子科技大学网络与信息安全学院,2014.
  • 8Sakemi Y, Izu T, Shirase M. Faster scalar multiplication for elliptic curve cryptosystems [C/OL]//IEEE 16th International Conference on Network-Based Information Systems, Gwangju, Sept 4-6, 2013. [2015-02-14]. http: //ieeexplore.ieee.org/stamp/stamp.jsp?tp=~amumber=6685455.
  • 9Gabrila Moise. On the attacks over the elliptic curve-based cryptosystems[C/OL]//IEEE Third International Con- ference on Emerging Intelligent Data and Web Technologies, Bucharest, Sept 19-21, 2012. [2015-02-17]. http: / / ieeexplore.ieee.org/ stamp/ stamp.jsp ? tp=~amumber=6354 7 49.
  • 10Liao Y P, Hsiao C M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol[J]. Ad Hoc Networks, 2014, 18(7): 133-146.

引证文献6

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部