期刊文献+

基于串空间模型的WAI密钥协商协议分析 被引量:1

Analysis of WAI key Agreement Protocol based on the Strand Space Model
原文传递
导出
摘要 WAPI实施方案中采用WAI(WLAN Authentication Infrastructure)协议来进行密钥协商,运用串空间模型分析验证了WAI协议中的单播密钥协商协议的实施方案,指出该实施方案较之原方案,安全性有了较大的提高。同时,利用该协议STA以及AP能够实现双向身份认证,并能安全地协商到会话密钥。 InWAPI implementation scheme, WAI(WLAN Authentication Infrastructure)is adopted to agree session key. This paper ana]yzes the implementation scheme of unicast key-agreement protocol in the WAI by the Strand Space Model, and points out that the security of the implementation scheme is greatly improved as compared with the original scheme. STA and AP can authenticate each other's identity, and achieve the session-key safely.
作者 高悦翔 李敏
出处 《通信技术》 2008年第12期313-315,共3页 Communications Technology
关键词 WhI协议 单播密钥协商 串空间 WAI protocol unicast key-agreement strand space
  • 相关文献

参考文献6

  • 1中华人民共和国国家标准.GB15629·11-2003(信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域l叫媒体访问控制和物理层规范).2003[S].
  • 2中华人民共和国国家质量监督检验检疫总局.GB 15629 1102-2003.无线局域网媒体访问控制和物理层规范:2.4GHz频段较高速物理层扩展规范[S],2004.3.
  • 3Fabrega F, Herzog J, Guttman J. Strand space: why is a security protocol correct [C]. Proceedings of the 1998 IEEE Symposium on Security and Privacy, California, USA: IEEE Computer Society Press, 1998, 160-171
  • 4Yongjian Li , Jun Pang. Generalized unsolicited tests for authentication protocol analysis [C]. Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, California, USA IEEE Computer Society Press, 2006, 509 - 514
  • 5余斌霄,王新梅.移动通信网中的认证与密钥建立协议[J].西安电子科技大学学报,2004,31(1):124-128. 被引量:6
  • 6IEEE P1363: Standard Specifications for Public Key cryptography[DB/OL] . http://grouper, ieee. org/groups/1363, 1999-12-20.

二级参考文献10

  • 1徐胜波,武传坤,王新梅.移动通信网中的认证与密钥分配[J].电子学报,1996,24(10):107-110. 被引量:9
  • 2Belier M J, Chang L F, Yacobi Y. Privacy and Authentication on a Portable Communications System[J]. IEEE JSAC, 1993, 11(6):821-829.
  • 3Belier M J, Yacobi Y. Fully-fledged Two-way Public Key Authentication and Key Agreement for Low-cost Terminals[J]. Electronics Letters, 1993, 29(11): 999-1001.
  • 4Carlsen U. Optimal Privacy and Authentication on a Portable Communications System[J] . ACM Operating Systems Review, 1994, 28(3) : 16-23.
  • 5Mu Y, Varadharajan V. On the Design of Security Protocols for Mobile Communications[A]. In ACISP'96, LNCS 1172[C]. NSW,Australian: Springer, wollongong, 1996. 134-145.
  • 6Heui K, Moon S. AKA Protocols for Mobile Communications[A]. In ACISP'2000, LNCS 1841[C]. Berlin: Springer-Verlag, 2000.400-411.
  • 7Hirose S, Yoshida S. A User Authentication Scheme with Identity and Location Privacy[A]. In ACISP'2001, LNCS 2119[C]. Berlin:Springer-Verlag, 2001. 235-246.
  • 8Horn G, Preneel B. Authentication and Payment in Future Mobile Systems[A]. Computer Security ESORICS 1998, LNCS 1485 [C].Berlin : Springer-Verlag, 1998. 277-293.
  • 9Gong L M, Needham R M, Saltzer J. Protecting Poorly Chosen Secrets from Guessing Attacks[J]. IEEE JSAC, 1993, 11(5): 648-656.
  • 10刘东苏,韦宝典,王新梅,马文平.第三代移动通信系统的安全体系结构[J].西安电子科技大学学报,2002,29(3):351-354. 被引量:6

共引文献5

同被引文献5

  • 1杨明,罗军舟.基于认证测试的安全协议分析[J].软件学报,2006,17(1):148-156. 被引量:16
  • 2GU'ITMAN JD, FABREGA FJT. Authentication Tests [ C ]//Proc. of the 2000 IEEE Symp on Security and Privacy. Los Amitoses: IEEE Computer Society Press, 2000. 96-109.
  • 3GUTYMAN JD, FABREGA FJT. Authentication tests and the structure of bundles [ J ]. Theoretical Computer Sci- ence. 2002, 283(02): 333-380.
  • 4PERRIG A, SONG D. Looking for Diamonds in the Desert -Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement[ C]//Proc. of the 13th IEEE Computer Security Foundations Workshop. Los Ami- toses: IEEE Computer Society Press ,2000.64-76.
  • 5刘家芬,周明天.突破认证测试方法的局限性[J].软件学报,2009,20(10):2799-2809. 被引量:7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部