作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (13): 22-24,5. doi: 10.3969/j.issn.1000-3428.2007.13.008

• 博士论文 • 上一篇    下一篇

对MAKAP协议的攻击及其改进

张亚娟1,2,李景峰1,3,祝跃飞1   

  1. (1. 信息工程大学网络工程系,郑州 450002;2. 广东省信息安全技术重点实验室,广州 510405; 3. 信息工程大学电子技术学院,郑州 450004)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-07-05 发布日期:2007-07-05

Attack and Improvement on MAKAP Protocol

ZHANG Yajuan1,2, LI Jingfeng1,3, ZHU Yuefei1   

  1. (1. Department of Network Engineering, Information Engineering University, Zhengzhou 450002; 2. Key Laboratory of Information Security Engineering, Guangdong Province, Guangzhou 510405; 3. Institute of Electronic Technology, Information Engineering University, Zhengzhou 450004)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-07-05 Published:2007-07-05

摘要: 给出了对MAKAP协议的一种并行攻击方法,利用该方法,攻击者能够在用户面前扮演诚实的服务器,同时在服务器面前扮演用户。攻击结束后,服务器认为自己已和用户成功建立起会话密钥,其实用户根本没有和服务器通信。分析了此协议遭受攻击的原因,在此基础上,对MAKAP协议进行改进,获得了MAKAP1协议。在随机谕示模型下证明:若DDHP不可解,则MAKAP1协议是安全的AK协议。

关键词: 密钥协商协议, 安全AK协议, 匹配对话

Abstract: MAKAP protocol is a mutual authentication key agreement protocol. An attack that makes the adversary to personate the receiver successfully is proposed. When the attack is finished, the server thinks he has established a session key with the user. But in fact, the user does not communicate with the server at all. An improved variant of the MAKAP protocol is given, and the paper proves that in the random oracle model, the improved protocol is a secure AK protocol assuming the DDHP is intractable.

Key words: key agreement protocol, secure AK protocol, matching conversation

中图分类号: