期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于通用可组合理论的协议安全性证明方法讨论
1
作者 刘宇靓 任伟 《信息网络安全》 2012年第6期18-22,共5页
文章介绍了可证明安全协议设计中较为流行的UC模型,对UC模型的提出、证明目标、证明过程等进行了总结和分析。通过一个公钥加密通信协议的举例,解释了UC模型下的证明过程。文章最后给出使用UC模型的一般规律。
关键词 可组合理论 UC安全模型 证明安全协议
下载PDF
Strand空间中基于安全密钥概念的证明思路 被引量:1
2
作者 任侠 吕述望 《通信学报》 EI CSCD 北大核心 2005年第2期29-34,共6页
提出了Strand空间模型中证明安全协议的一个新思路,它从安全密钥的概念出发,参照基于理想概念的证明方法,得出证明所需的预备结论,从而对协议的秘密属性与认证属性进行证明。此外,还给出了一个针对Yahalom-BAN协议安全性的证明实例,从... 提出了Strand空间模型中证明安全协议的一个新思路,它从安全密钥的概念出发,参照基于理想概念的证明方法,得出证明所需的预备结论,从而对协议的秘密属性与认证属性进行证明。此外,还给出了一个针对Yahalom-BAN协议安全性的证明实例,从中可以看到该思路非常适于采用对称加密体制且具有密钥分发功能的三方认证协议的证明,并且它还使得证明过程简洁而直观。 展开更多
关键词 计算机科学技术基础学科 安全协议证明 strand空间模型 安全密钥 理想概念
下载PDF
The New Enhanced Simple Authenticated Key Agreement Algorithm 被引量:1
3
作者 蒋睿 李建华 潘理 《Journal of Donghua University(English Edition)》 EI CAS 2006年第1期136-139,共4页
Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it ha... Simple authenticated key agrcement algorithm is one of the Diffie-Hellman key agreement variations. It prevents man-inthe-middle attack with only two more packets required to agree on the secret session key, but it has some weaknesses. In this paper, a new enhanced simple authenticated key agreement algorithm is proposed to overcome these weaknesses on the basis of analyzing the weaknesses of the related protocols. The new enhanced simple authenticated key agreement algorithm can get over replay attack and password guessing attack, provide perfect forward secrecy, and hold the merits of the simple authenticated key agreement algorithm. 展开更多
关键词 agreement protocol AUTHENTICATION cryptography.
下载PDF
Study on RFID Authentication Protocol Theory 被引量:3
4
作者 齐勇 姚青松 +1 位作者 陈滢 钟虓 《China Communications》 SCIE CSCD 2011年第1期65-71,共7页
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ... Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future. 展开更多
关键词 RFID security and privacy authentica- tion protocol THEORY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部