期刊文献+

Sun等两个完美前向安全E-mail协议分析与改进

Cryptanalysis and improvements on Sun et al.'s e-mail protocols with perfect forward secrecy
在线阅读 下载PDF
导出
摘要 2005年,Sun等提出了两个完美前向安全的E-mail协议,尽管从短密钥保护的有效性来看这两个协议是安全的,但它们都不能提供密文的认证性,如果一个主动攻击者拦截或修改密文,则E-mail接受者会收到一个错误的明文。为了克服此缺点,对此两个协议作了改进,使得改进后的协议具有认证性,从而有更好的安全性和实用性。 In 2005,Sun et al have proposed two secure e-mail protocols with perfect forward secrecy.Although these two protocols seem to be secure from the protective efficiency of the short-term key,yet neither of them has considered the authentication of the delivering ciphertext.If an outside attacker intercepts and modifies a delivering ciphertext,the e-mail receiver will have to accept a false plaintext.To overcome this flaw,in this paper we will make improvements on Sun et al.'s protocols such that the improved protocols have authentication,better security and practicality.
作者 苏仁旺
出处 《计算机工程与应用》 CSCD 北大核心 2008年第21期69-71,共3页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China)
关键词 完美前向安全 机密性 协议 认证性 E—mail perfect forward secrecy confidentiality protocol authentication e-mail
  • 相关文献

参考文献8

  • 1Sun H-M,Ssieh B-T,Hwang H-J.Secure e-mail protocols providing perfect fox.yard secrecy[J].IEEE Communications Letters,2005,9 (1):58-60.
  • 2Schneier B.E-mail security:how to keep your electronic messages private[M].[S.l.]:John Wiley & Sons Canada,Limited,1995.
  • 3Bacard A.The computer privacy handbook:a practical guide to e-mail encryption,data protection,and PGP privacy software[M]. Berkeley, CA : Peachpit Press, 1995.
  • 4ELGamal T.A public key crytosystem and a signature scheme based on discrete logarithms[J].IEEE Trans on Information Theory, 1985,31 (4) : 369-472.
  • 5Bao F,Deng R H,Mao W.Efficient and practical fair exchange protocols with off-line TTP[C]//IEEE Symposium on Security and Privacy Proceedings, 1998 : 77-85.
  • 6Schnorr C P.Efficient signature generation for smart card[J].Journal of Cryptology, 1991 4(3) : 161-174.
  • 7Pointcheval D,Stern J.Security arguments for digital signature and blind signatures[J].Journal of Cryptology,2000,13(3):361-396.
  • 8Bellare M,Rogaway P.Random oracles and practical:a paradigm for designing efficient protocols[C]//Proceeding of the First ACM Conference on Computer and Communications Security, 1993:62-73.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部