期刊文献+

产生“一次一密”会话密钥的抗重放攻击鉴别协议 被引量:1

Identification Protocols Secure Against Reset Attacks and Generating One-time Session Keys
下载PDF
导出
摘要 文章在抗重放攻击的身份认证协议的基础上,提出了一种新的产生会话密钥的协议,在身份认证后的协议执行的每一步,利用DIFFIE HELLMAN算法产生的密钥作为移位寄存器的初态,由移位寄存器产生适当长度的密钥流作为会话密钥,且此密钥只使用一次,达到了或接近了"一次一密"的效果,具有较高的安全性。 This paper presented a new method of generating the key used only once based on a identification protocols secure against reset attacks. In every step,we use DIFFIEHELLMAN algorithm to generates the first state of FSR. Then the FSR generates onetime key. The protocol is more security that conventional protocols in generating session key.
出处 《计算机应用》 CSCD 北大核心 2003年第7期24-25,共2页 journal of Computer Applications
基金 国家973项目(G1999035804) 自然科学基金资助项目(90204015 19931010) 河南省杰出青年基金资助项目(0212001400)
关键词 密码协议 身份认证 会话密钥 移位寄存器 一次一密 公钥密码 cryptograph protocols identification algorithm session key feedback shift register one-time key public-key
  • 相关文献

参考文献4

  • 1Bellare M, Fischlin M, Goldwasser S, et al. Identification protocols secure against reset attacks[ A]. Preliminary version of this paper,Advances in Crypyology-EUROCRYPT'01 Lecture Notes in Computer Science[ C]. Springer-Verlag, 2001. 2045.
  • 2Selmer ES. Linear Recurrence over Finite Field[ D]. University of Bergen, Norway, 1966.
  • 3Bellovin SM, Merritt M. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary attacks[ A]. Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy[ C], 1992. 72 -84.
  • 4Anderson R J, Lemas TMA. Fortitying Key Negotation Schemes with Poorly Chosen Passwords [ J ]. Electronics Letters, 1994, 30 (13) :1040 - 1041.

同被引文献6

  • 1徐远航.USB Key身份认证产品的产生与发展[J].计算机安全,2004(8):44-45. 被引量:15
  • 2陈航,周剑岚,冯珊.基于SHA和RSA算法 实用有效的双向身份认证系统[J].计算机安全,2006(4):6-8. 被引量:16
  • 3Ding Y,Horster P.Undetectable On-Line Password Guessing Attacks[J].ACM Operating Systems Review,1995,29(4):77-86.
  • 4Sun H M.An Efficient Remote User Authentication Scheme Using Smart Cards[J].IEEE Trans on Consumer Electronics,2000,46(4):958-961.
  • 5Wu S T,Chieu B C.A Note on a User Friendly Remote Authentication Scheme with Smart Cards[J].IEICE Trans on Fundamentals,2004,87(8):2180-2181.
  • 6Chang Ya-Fen,Chang Chin-Chen,Su Yu-Wei.A Secure Improvement on the User-Friendly Remote Authentication Scheme with no Time Concurrency Mechanism[A].Proc of the 20th Int'l Conf on Advanced Information Networking and Applications.Vol 2[C].2006.5-8.

引证文献1

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部