作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (23): 127-130,136. doi: 10.3969/j.issn.1000-3428.2012.23.031

• 安全技术 • 上一篇    下一篇

基于无证书密钥协商的Kerberos改进协议

王 娟1,2,郑淑丽2,操漫成1,方元康1,3   

  1. (1. 池州学院数学与计算机科学系,安徽 池州 247000;2. 合肥工业大学计算机与信息学院,合肥 230009; 3. 南京航空航天大学信息科学与技术学院,南京 210016)
  • 收稿日期:2012-02-22 出版日期:2012-12-05 发布日期:2012-12-03
  • 作者简介:王 娟(1977-),女,讲师、硕士,主研方向:网络与信息安全;郑淑丽,副教授、博士;操漫成,副教授、硕士;方元康,副教授、博士
  • 基金资助:
    国家“863”计划基金资助项目(2009AA010307);国家自然科学基金资助项目(61100034, 61170043);安徽省高等学校自然科学研究基金资助项目(KJ2011B108, KJ2012Z273)

Improved Kerberos Protocol Based on Certificateless Key Agreement

WANG Juan 1,2, ZHENG Shu-li 2, CAO Man-cheng 1, FANG Yuan-kang 1,3   

  1. (1. Department of Mathematics and Computer Science, Chizhou College, Chizhou 247000, China; 2. College of Computer and Information, Hefei University of Technology, Hefei 230009, 3. College of Information Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China)
  • Received:2012-02-22 Online:2012-12-05 Published:2012-12-03

摘要: Kerberos认证协议容易遭受口令攻击和重放攻击,且需要2次双线性对运算、2次指数运算和1次椭圆曲线上的点乘运算,计算量大。为此,利用高效的无证书密钥协商对Kerberos协议进行改进。用户与认证服务器之间通过使用无证书签密技术抵抗伪造攻击。分析结果证明,改进协议符合密钥协商的6个基本安全要求,满足已知密钥安全性、完美前向安全性、抗未知密钥共享安全性、密钥不可控性、已知会话临时信息安全性,能抵抗口令攻击、重放攻击、中间人攻击及密钥泄漏伪装攻击,并且仅需3次点乘运算,具有较高的效率。

关键词: Kerberos协议, 无证书公钥密码学, 密钥协商, 身份认证

Abstract: Kerberos authentication protocol is apt to suffer password attack and replay attack, and it needs double bilinear logarithmic operations, double exponent arithmetic and one dot multiplication on elliptic curve. Aiming at vulnerability and large amount of computation of Kerberos authentication protocol, this paper improves it with the help of high-efficient certificateless key agreement. In order to resist masquerade attacks, the certificateless signcryption technology is used between a user and authentication service. Analysis result proves that the improved protocol meets six basic security demands of key agreement. That’s to say, it can satisfy with the requirements of known key security, perfect forward security, resisting unknown key sharing security, keys’ uncontrollability and temporal known session information security. It can resist password attack, replay attack, intermediary attack and key exposure impersonation attack, and has higher efficiency with only three dot multiplications.

Key words: Kerberos protocol, Certificateless Public Key Cryptography(CL-PKC), key agreement, identity authentication

中图分类号: