期刊文献+

改进密钥交换算法的WTLS协议扩展分析

Improved key exchange protocol extension analysis WTLS
下载PDF
导出
摘要 针对人们对无线通信网络的功能和安全越来越高的要求,提出基于EC_DH交换密钥和基于RSA交换密钥的扩展WTLS(Wireless Transport Layer Security)协议。首先分析WAP安全架构中WTLS的安全性问题,然后根据数据的机密性、完整性以及在移动电话和其它无线终端中完成授权鉴定,在此基础上针对漏洞提出解决方案,改进后的协议增加了一个颁发证书的过程。最后通过案例证明本协议的安全性。结果表明,WTLS协议是一个更高安全性的协议,在无线通信网络中有着重要的价值和研究意义。 For people on the wireless communication network functionality and security of increasmg demands this paper puts forward based EC_DH exchange keys and RSA key exchange based on the expansion of WTLS ( Wireless Transport Layer Security) protocol. First it analyses WAP WTLS security issues of security architecture, according to data confidentiality, integrity, and on mobile phones and other wireless terminals to complete the authorization identification, on this basis, propose solutions to address vulnerabilities, improved protocol increases a certificate of the process. Finally, the case demonstrates the safety of this Agreement. The results showed that, WTLS protocol is a higher security protocol, the wireless communication network has an important value and significance.
作者 陈小明
出处 《信息技术》 2014年第12期173-176,共4页 Information Technology
关键词 无线通信 网络 交换密钥 安全 WTLS协议 wireless communication network key exchange safety WTLS protocol
  • 相关文献

参考文献15

  • 1WAP Forum.Wireless Application Protocol Wireless Transport Layer Security Specification Version 06[EB/OL].(2006).http:∥www.wapforum.org.
  • 2TSL.The TLS Protocol version 1.0[EB/OL].(2006).http:∥www.ietf.org.
  • 3PARK D,BOYD C,MOON S.Forward Secrecy and Its Application to Future Mobile Communications Security[C].PKC2000,2000.
  • 4LEE K,MOON S.AKA Protocols for Mobile Communica-tions[C].Proceedings of 6th Australasian Conference In-formation Security and Privacy,ACISP2000.
  • 5KWARK D J,HA J C,LEE H J.A WTLS Handshake Protocol with User Anonymous and Forward Secrecy[C].Proceedings of Eurocrypto 2003,2003.
  • 6LENSTRA K,VERHEUL R.The XTR public key system[C].Proceedings of Crypto2010,2010.
  • 7LENSTRA K,VERHEUL R.Key improvements to XTR[C].Proceedings of Asiacrypt2000,2000.
  • 8Qualcomm.ltd.co.Mobile Station Modem6250 specification[EB/OL].(2006).http:∥www.cdmatech.com.cn/solutions/pdf/msm6250chipset.pdf.
  • 9何德全,肖国镇,卿斯汉,等.安全协议[M].北京:清华大学出版社,2005:215-217.
  • 10向文,陶良升,王同洋.一种高效的WTLS握手协议[J].计算机应用,2008,28(11):2798-2800. 被引量:5

二级参考文献24

  • 1K Lee, S Moon, W Jeong, T Kim. A-2-pass authentication and key agreement protocol for mobile communications. In: Proceedings of the 2nd International Conference on Information Security and Cryptology, ICISC'99. 1999. 143-155
  • 2C Gunther. An identity-based key-exchange protocol. In:Advances in Cryptology-Eurocrypto'89. Springer-Verlag, 1990.29-37
  • 3W A P Forum. Wireless application protocol wireless transport layer security specification. Version 06-Apr-2001
  • 4W Diffie, P van Oorschot, M Wiener. Authentication and authenticated key exchanges. Designs Codes and Cryptography. 1992.2:107-125
  • 5M Bellare, S K Miner. A forward-secure digital signature scheme. In: Advances in Cryptology-Crypto'99. Springer-Verlag, 1999
  • 6DongGook Park, Colin Boyd, Sang-Jae Moon. Forward secrecy and its application to future mobile communications security. PKC2000,LNCS 1751. Spring-Verlag, 2000. 433-445
  • 7K Lee, S Moon. AKA protocols for mobile communications. In: Proceedings of 6th Australasian Conference Information Security and Privacy, ACISP2000. 2000. 400-411
  • 8F Bao, R H Deng. A signcryption scheme with signature directly verifiable by public key. In: Proc of PKC'98, LNCS 1431. 1998. 55-59
  • 9Mitchell C J, PiperF, Wild P. Digital signatures. In: Contemporary Cryptology, The Science of Information Integrity. IEEE Press, 1992.325-378
  • 10张惠媛.移动互联网与WAP技术[M].北京:电子工业出版社,2002..

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部