作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (20): 151-152. doi: 10.3969/j.issn.1000-3428.2009.20.053

• 安全技术 • 上一篇    下一篇

适应受限环境的认证协议及其SVO逻辑分析

刘志猛,赵燕丽,范 辉,原 达   

  1. (山东工商学院计算机科学与技术学院,烟台 264005)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-10-20 发布日期:2009-10-20

Authentication Protocol Suit for Restriction Environment and Its SVO Logic Analysis

LIU Zhi-meng, ZHAO Yan-li, FAN Hui, YUAN Da   

  1. (College of Computer Science and Technology, Shandong Institute of Business and Technology, Yantai 264005)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-10-20 Published:2009-10-20

摘要: 针对认证协议在受限通信网络环境中的应用和安全问题,提出一种基于椭圆曲线密码技术的认证协议,使用对称密码为协议中的交互信息提供机密性,在协议最后生成参与者共享的会话密钥。采用扩展的SVO逻辑对推荐协议进行形式化分析,结果证明该协议的安全性符合要求。

关键词: 安全协议, 身份认证, 会话密钥, SVO逻辑, 逻辑分析

Abstract: Aiming at the application and security problem of authentication protocol in restriction communication environment, this paper presents an authentication protocol based on elliptic curve cryptographic techniques, in which data confidentiality of exchanged information is supported by symmetric cryptography. The conversation key shared by participants is generated in the end of the protocol. Formal anlysis is done on recommended protocol by using extended SVO logic and the security of the protocol is proved by the results.

Key words: security protocol, identity authentication, conversation key, SVO logic, logic analysis

中图分类号: