作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2013, Vol. 39 ›› Issue (1): 140-143. doi: 10.3969/j.issn.1000-3428.2013.01.030

• 安全技术 • 上一篇    下一篇

一种三方认证密钥协商协议的分析与改进

唐祚波,缪祥华   

  1. (昆明理工大学信息工程与自动化学院,昆明 650500)
  • 收稿日期:2012-03-19 修回日期:2012-05-06 出版日期:2013-01-15 发布日期:2013-01-13
  • 作者简介:唐祚波(1988-),男,硕士研究生,主研方向:信息安全;缪祥华(通讯作者),副教授、博士后

Analysis and Improvement of a Three-party Authenticated Key Agreement Protocol

TANG Zuo-bo, MIAO Xiang-hua   

  1. (College of Information Engineering & Automation, Kunming University of Science and Technology, Kunming 650500, China)
  • Received:2012-03-19 Revised:2012-05-06 Online:2013-01-15 Published:2013-01-13

摘要: 大多数三方认证密钥协商协议不能抵抗中间人攻击。为此,对Tan提出的三方认证密钥协商协议(Journal of Communications, 2010, No.5)进行分析,证明其不能抵抗发起者假冒攻击、响应者假冒攻击及中间人攻击,并利用单向哈希函数和椭圆曲线密码学技术对协议进行改进。理论分析与形式化证明结果表明,改进协议继承了原协议的安全性,并能抵抗假冒攻击及中间人攻击。

关键词: 三方认证密钥协商协议, 假冒攻击, 中间人攻击, 椭圆曲线, 单向哈希函数, CDH假设

Abstract: Most Three-party Authenticated Key Agreement(3PAKA) protocols are susceptible to man-in-the-middle attack. This paper analyzes security of the 3PAKA protocol presented by Tan, and proves that it can not withstand counterfeit attacks and man-in-the-middle attack. To enhance its security, an improved protocol is proposed by one-way hash function and elliptic curve cryptography. Security analysis and formal proof results show that the improved protocol inherits the security of the original protocol, and is able to resist counterfeit attack and man-in-the-middle attack.

Key words: Three-party Authenticated Key Agreement(3PAKA) protocol, counterfeit attack, man-in-the-middle attack, elliptic curve, one-way hash function, Computational Diffie-Hellman(CDH) assumption

中图分类号: