期刊文献+

一种基于令牌的认证密钥交换协议 被引量:3

A Token-based Authenticated Key Exchange Protocol
在线阅读 下载PDF
导出
摘要 对称密钥系统较之非对称密钥系统具有惊人的速度优势,但是管理对称密钥系统的密钥却是需要解决的一个难题。Diffie-Hellman密钥交换是一个可以使通信双方在不可信信道上一同建立共享密钥,并使之应用于后继对称密钥通信系统的一种密码协议。应当注意到,Diffie-Hellman密钥交换协议不支持对所建立的密钥的认证。处于两个通信参与者Alice和Bob之间的一个恶意的攻击者Mallary可以主动操纵协议运行过程的信息并成功实施所谓的中间人攻击(man-in-the-middleattack)。因此为了能够真正在两个通信参与者Alice和Bob之间协商一个密钥就必须确保他们在协议运行过程中收到的信息的确是来自真实的对方。本文就是给出一种基于令牌的认证密钥交换协议以对Diffie-Hellman密钥交换协议进行改进。这对于电子商务等等很多网络应用而言是至关重要的。本文也给出了这种协议的安全性分析,并描述了基于JAVA的实现。 The symmetric key systems compared with asymmetric key systems have astounding speed benefits, but managing their keys has always been difficult problem to be solved. Diffie-Hellman key exchange is a cryptographic protocol which allows two parties to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher. It should be noted that the Diffie-Hellman key exchange protocol does not support the authenticity of the key agreed. An adversary Mallory in the middle of the communications between two principals Alice and Bob can manipulate the protocol messages to succeed an active attack called man-in-the-middle attack. In order to agree on a key which is exclusively shared between Alice and Bob, these principals must make sure that the messages they receive in a protocol run are indeed from the intended principals. In this paper we propose a protocol to modify the Diffie-Hellman key exchange. This protocol can provide authentication based on tokens. This is critical for many network applications such as e-business etc. Security analysis of this modified protocol is given and its implementation based on JAVA is also presented.
作者 尹少平
出处 《微计算机信息》 北大核心 2006年第01X期49-51,35,共4页 Control & Automation
基金 "一种基于令牌的抗攻击密钥交换协议"获得山西省教育厅2004年高校科研开发项目20041342资助
关键词 令牌 身份认证 DH—EKE JAVA 口令 Token, Authentication, DH-EKE,JAVA, password
  • 相关文献

参考文献2

二级参考文献3

共引文献8

同被引文献6

  • 1李琼,牛夏牧,孙圣和.基于生物信息的模糊密钥绑定算法研究[J].测试技术学报,2004,18(z1):61-64. 被引量:1
  • 2LI Qiong NIU Xiamu SUN Shenghe.A Novel Biometric Key Scheme[J].Chinese Journal of Electronics,2006,15(1):99-102. 被引量:3
  • 3Bruceschneier.应用密码学协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 4W.Diffie and M.E Hellman, New directions in cryptography[J].IEEE Trans IT, 1976,22(6) :644-654.
  • 5Lim,C.H., AND LEE,P.J. A key recovery attack on discrete log-based schemes using a prime order subgroup. In Advances in Cryptology- CRYPTO' 97
  • 6William Stallings著,刘玉珍,王丽娜译.密码编码学与网络安全:原理与实践(第三版).北京:电子工业出版社,2004年.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部