期刊文献+

一种密钥管理协议的设计和实现 被引量:2

DESIGN AND IMPLEMENTATION OF A KEY MANAGEMENT PROTOCOL
下载PDF
导出
摘要 本文在分析目前密码管理协议的基础上,针对DSPS系统的需求和特点设计并实现一种密钥管理协议。目前普遍的密钥交换算法,采用时间戳或随机数来确认产生的会话密钥的新鲜性,本文引入了新的密钥产生函数KHF,保证通信双方只有同步交换信息时,才能得到正确的会话密钥。 Basing on the analysis of the popular key management protocols,we design and implement a novel key management protocol aiming at the requirements of DSPS system. Current key exchange algorithm commonly uses timestamps or random number to verify the freshness of the new session key. In this article we use KHF to generate the session key, so that users are guaranteed to get correct session key, only when information exchange is in synchronization and in security.
出处 《计算机应用与软件》 CSCD 北大核心 2002年第12期40-43,共4页 Computer Applications and Software
关键词 密钥管理协议 设计 密钥交换协议 密钥散列函数 密码学 Key management protocol Key exchange protocol Key hash function
  • 相关文献

参考文献8

  • 1[1]CAI Liang, YANG Xiao - Hu, DONG Jin - Xiang, Thread Analysis and Security Protection for Malicious DMBS, ICYCS 2001.
  • 2[2]S. Bakhtiari, R. Safavi - Naini and J. Pieprzyk, "Keyed Hash Functions",Cryptography: Policy and Algorithms, Sprinter - Verlag, 1996, pp. 201~214.
  • 3[3]Colin Boyd, "A Class of Flexible and Efficient Key Management Protocols"IEEE, 1996.
  • 4[4]S.M. Bellovin and M. Merrit, "Limitations of the Kerberos Protocol"Winter 1991 USENIX Conference Proceedings, USENIX Association, 1999, pp. 253~267.
  • 5[5]Douglas Maughan, Mark Schertler, Mark Schneider, and Jeff Turner, Intemet Security Association and Key Management Protocol( ISAKMP). Intemet-draft, IPSEC Working Group,June 1996.
  • 6[6]C.Meadows,Applying formal methods to the analysis of a key management protocol, Joumal of Computer Security, 1(1 )5 - 36,1992.
  • 7[7]A. Aziz, M. Patterson, and G. Baehr, Simple Key- Management for Internet Protocols(SKIP), In Proceedings of the Internet Society International Netwoking Conference, June 1995.
  • 8[8]R. Rivest, The MD5 Message Digest Algorithm RFC 1321 April 1992, Networking Group. MIT Laboratory for Computer Science and RSA Data Security Inc.

同被引文献8

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部