期刊文献+

基于方向的重放攻击防御机制 被引量:7

Direction-based Replay Attack Defense Mechanism
下载PDF
导出
摘要 对重放攻击类型以及常用防御手段进行了分析,基于对常用的新鲜因子缺陷的思考,提出了一种基于方向的重放攻击防御机制,基于双向通信的新鲜性检查办法,结合了加密机制、算法机制、应答机制,采用带方向持续累加的序列号作为新鲜因子,用较小的代价实现对直接重放、反射重放、转移重放等各种类型重放攻击的有效防御,对通信协议的安全性设计具有一定的实际应用价值,此机制的代价小,尤其适用于PSTN、短波等窄带通信。 Comprehensive analysis is done on the types and common defense means of replay attacks,and based on the consideration of common fresh factor defects,a new direction-based freshness checking mechanism is proposed.Based on the freshness checking method of bidirectional communication,combined with encryption mechanism,algorithm mechanism and response mechanism,and with the serial number continuously accumulating in the direction as the new factor,the effective defense against direct replay,reflection replay,transfer replay and other types of replay attacks is realized at a small cost,and this has certain practical application value for the security design of communication protocols.This mechanism,small in cost,is particularly suitable for PSTN and shortwave and other narrowband communications.
作者 王效武 刘英 WANG Xiao-wu;LIU Ying(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2019年第6期1500-1503,共4页 Communications Technology
关键词 安全协议 重放攻击 新鲜因子 security protocol replay attack fresh factor
  • 相关文献

参考文献3

二级参考文献75

  • 1卓继亮,李先贤,李建欣,怀进鹏.安全协议的攻击分类及其安全性评估[J].计算机研究与发展,2005,42(7):1100-1107. 被引量:16
  • 2梅其祥,何大可,郑宇.基于Pairing抗选择密文攻击的新门限密码体制[J].西南交通大学学报,2005,40(6):727-730. 被引量:1
  • 3陶宏才,何大可.Sequence Patterns of Identity Authentication Protocols[J].Journal of Southwest Jiaotong University(English Edition),2006,14(3):205-211. 被引量:2
  • 4G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software-Concepts and Tools, 1996, 17(3):93~ 102
  • 5M. Burrows, M. Abadi, R. Needham. A logic of authentication.ACM Trans. Computer Systems, 1990, 8(1): 18~36
  • 6C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 1996, 26(2): 113~131
  • 7L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998, (6): 85~128
  • 8F.J. Thayer, J. C. Herzog, J. D. Guttman. Strand spaces:Why is a security protocol correct? In: Proc. the 1998 IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998. 160~ 171
  • 9D. Dolev, A. Yao. On the security of public key protocols. IEEE Trans. Information Theory, 1983, 29(2): 198~208
  • 10D. Dolev, S. Even, R. M. Karp. On the security of ping-pong protocols. Information and Control, 1982, 55 (1-3): 57- 68

共引文献29

同被引文献58

引证文献7

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部