期刊文献+

Lai的三方密钥协商协议的密码分析与改进

Cryptanalysis and improvement of Lai's authenticated group key transfer protocol
下载PDF
导出
摘要 最近,Lai等人利用加强的Chebyshev混沌映射设计了一个三方密钥协商协议,声称该协议能够抵抗各类攻击。针对Lai协议中存在的匿名传输等方面的缺陷,通过拦截、修改用户与可信第三方之间的传输数据,成功进行了中间人攻击。在Lai等人的协议基础之上,利用哈希函数、加强的Chebyshev混沌映射以及对称加密思想提出了一个改进方案。分析表明,改进协议在保持Lai协议良好性能的基础上,不但保证了信息传输的安全性,而且能够有效抵抗中间人攻击及其他多种攻击。 Recently, Lai et al. first designed a three-party key agreement protocol using enhanced Chebyshev chaotic map, and claimed that the protocol could resist various attacks. To analyze the drawbacks of the protocol in anonymous transmission process, this paper made a man-in-the-middle attack successfully by intercepting and modifying the transmitted data between the user and the trusted third party. Then it constructed a new improved protocol adopting hash function, enhanced Chebyshev chaotic map and symmetric encryption method based on Lai et al. ' s protocol. Analysis demonstrates that the proposal protocol holds the good properties of Lai et al. ' s protocol. It not only can ensure the security of information transmission, but also can resist man-in-the-middle attack and other attacks effectively.
出处 《计算机应用研究》 CSCD 北大核心 2015年第1期254-257,261,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61070189 61272435)
关键词 三方密钥协商 认证 Chebyshev混沌映射 中间人攻击 密码分析 three-party key agreement authentication Chebyshev chaotic map man-in-the-middle attack cryptanalysis
  • 相关文献

参考文献14

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography [ J ]. IEEE Trans on Information Theory, 1976,22 (6) :644-654.
  • 2KOCAREV L. Chaos-based cryptography: a brief overview[ J]. IEEE Circuits and Systems Magazine,2001,1 (3) :6- 21.
  • 3SHEU L J. A speech encryption using fractional chaotic systems[ J]. Nonlinear Dynamics, 2011,65 ( 1 - 2 ) : 103 - 108.
  • 4WANG Yong, WONG K W, LIAO Xiao-feng, et el. A block cipher with dynamic S-boxes based on tent map [ J ]. Communications in Nonlinear Science and Numerical Simulation, 2009, 14 ( 7 ) : 3089 - 3099.
  • 5XIAO Di, SH1H F Y, LIAO Xiao-feng. A chaos-based hash function with both modification detection and localization capabilities [ J ]. Communications in Nonlinear Science and Numerical Simula- tion,2010,15(9) :2254-2261.
  • 6XIAO Di, LIAO Xiao-feng, DENG Shao-jiang. A novel key agree- ment protocol based on chaotic maps [ J]. Information Sciences, 2007,177(4) :1136-1142.
  • 7HAN Song. Security of a key agreement protocol based on chaotic maps [ J ]. Chaos, Solitons & F ractals, 2008,38 ( 3 ) :764- 768.
  • 8TSENG H R, JAN Rong-hong, YANG W. A chaotic maps-based key agreement protocol that preserves user anonymity [ C ]//Proc of IEEE International Conference on Communications. [ S. 1. ] : IEEE Press, 2009 : 1-6.
  • 9NIU Yu-jun, WANG Xing-yuan. An anonymous key agreement proto- col based on chaotic maps[ J]. Communications in Nonlinear Sci- ence and Numerical Simulation,2011,16(4) :1986-1992.
  • 10YOON E J. Efficiency and security problems of anonymous key agree- ment protocol based on chaotic maps[ J]. Communications in Non- linear Science and Numerical Simulation, 2012, 17 ( 7 ) : 2735- 2740.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部