作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程

• 安全技术 • 上一篇    下一篇

基于身份认证的密钥交换改进协议

高丽丽,李顺东   

  1. (陕西师范大学计算机科学学院,西安710119)
  • 收稿日期:2013-11-18 出版日期:2014-11-15 发布日期:2014-11-13
  • 作者简介:高丽丽(1988 - ),女,硕士研究生,主研方向:密码学,信息安全;李顺东,教授、博士生导师。
  • 基金资助:
    国家自然科学基金资助面上项目“高性能保密计算算法与协议研究”(61070189);国家自然科学基金资助面上项目“云计算 与云存储若干关键问题研究”(61272435)。

Improved Identity-based Authenticated Key Exchange Protocols

GAO Lili,LI Shundong   

  1. (School of Computer Science,Shaanxi Normal University,Xi’an 710119,China)
  • Received:2013-11-18 Online:2014-11-15 Published:2014-11-13

摘要: 基于离散对数的困难性假设,H?lbl 等人提出了2 个基于身份认证的密钥交换协议HW1 和HW2 (Computer Standards & Interfaces,2009,No. 6)。HW1 协议能够有效抵抗Tseng 等人提出的攻击( Journal of Computers,2002,No. 3),HW2 协议则具有较高的效率,但Shim 等人发现HW1 不能抵抗中间人攻击和伪装攻击, HW2 不能抵抗伪装攻击(IEEE Communications Letters,2012,No. 4)。通过分析Shim 等人提出的攻击方案,找出这2 个协议能够被篡改的原因,分别提出改进的HW1 和HW2 协议,利用Hash 函数对传输的信息做Hash 验证,以防 止信息被篡改。对改进协议进行可行性证明和安全性分析,结果表明,2 种协议能够有效抵抗中间人攻击和伪装攻 击,具有较高的安全性。

关键词: 密钥交换, 基于身份, 中间人攻击, 伪装攻击, Hash 函数, 离散对数问题

Abstract: Based on the difficulty of the discrete logarithm assumption,H?lbl et al(Computer Standards & Interfaces, 2009,No. 6) presented two identity-based authenticated key exchange protocols. The first protocol,denoted by HW1, improved Hsieh et al’ s protocol which makes it immune against Tseng et al’ s attack (Journal of Computers,2002, No. 3),while the second protocol,denoted by HW2,improves the efficiency of Tseng’s protocol. Shim et al analyzes these two protocols,and then shows that the HW1 can not resist the man-in the-middle attack and the impersonation attack,and the HW2 can not resist the impersonation attack(IEEE Communications Letters,2012,No. 4). This paper conducts a detailed analysis on the flaw,and finds the reason of the protocols are tampered,making use of the Hash function,authenticates the information to prevent the information is tampered,it proposes improved protocols based on these two protocols,and analyzes the security of improved protocols. The results suggest that the improved protocols can resist the man-in-the-middle-attack and the impersonation attacks,they are safe and feasible.

Key words: key exchange, identity-based, man-in-the-middle attack, impersonation attack, Hash function, discrete logarithm problem

中图分类号: