作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2006, Vol. 32 ›› Issue (17): 32-34. doi: 10.3969/j.issn.1000-3428.2006.17.012

• 博士论文 • 上一篇    下一篇

Needham-Schroeder私钥协议的改进

缪祥华1;何大可2   

  1. (1. 西南交通大学计算机与通信工程学院,成都 610031;2. 西南交通大学信息安全与国家计算网格实验室,成都 610031)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2006-09-05 发布日期:2006-09-05

Improvement of Needham-Schroeder Protocol with Shared Keys

MIAO Xianghua1;HE Dake2   

  1. (1. School of Computer and Communication Engineering, Southwest Jiaotong University, Chengdu 610031;
    2. Laboratory of Information Security and National Computing Grid, Southwest Jiaotong University, Chengdu 610031)
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-09-05 Published:2006-09-05

摘要: 研究了Needham-Schroeder私钥协议,指出了该协议存在的缺陷和漏洞,并给出了一种攻击该协议方法。虽然Needham和Schroeder对原始的协议进行了修改,但修改后的协议仍然存在缺陷。还有其他一些学者也对该协议进行了修改,但是仍然不令人满意。针对原始协议存在的缺陷和漏洞,该文进行了相应的修改,并用BAN逻辑来分析了修改后的协议,说明修改后的协议能够达到协议的目标。

关键词: 协议分析, BAN逻辑, Needham-Schroeder私钥协议

Abstract:

This paper researches on Needham-Schroeder protocol with shared keys. It points out bugs and leaks that the protocol exists, and provids a kind of method to attack the protocol. Needham and Schroeder have revised the primitive protocol, but the amended protocol still has a leak. Some other scholars have revised this protocol too, but the amended protocol still is unsatisfactory. In allusion to bugs and leaks existing to the primitive protocol, the paper carries on corresponding modification, and analyses the amended protocol with BAN logic. It indicates that the amended protocol can reach the goal of the protocol.

Key words: Protocol analysis, BAN logic, Needham-Schroeder protocol with shared keys

中图分类号: