Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2006, Vol. 32 ›› Issue (12): 171-172.

• Security Technology • Previous Articles     Next Articles

Authenticated Key Exchange Algorithm

LI Yamin, LI Xiaopeng, WU Guo   

  1. Institute of Electronic Technology, PLA University of Information Engineering, Zhengzhou 450004
  • Online:2006-06-20 Published:2006-06-20

身份认证的密钥交换算法

李亚敏,李小鹏,吴 果   

  1. 解放军信息工程大学电子技术学院,郑州 450004

Abstract: Key agreement is the procedure that the two sides of the communication negotiate a session key. Diffie-Hellman key agreement protocol is well known, but this protocol can not resist man-in-the-middle(MID) attack. Several protocols that can escape MID attack have been proposed. Those protocols are complicated. A simple authenticated key agreement algorithm (SAKA) and its enhanced protocols are developed. They are very simple, but some weaknesses are founded. A new protocol based on SAKA is proposed in this paper, which can make up these weaknesses.

Key words: Key agreement; Authentication; Man-in-the-middle attack

摘要: 密钥交换是通信双方建立会话密钥的过程,Diffie-Hellman 协议是一种有代表性的算法,但是这种算法不能够抵抗中间人攻击。为了抵抗中间人攻击,陆续出现了几种具有身份认证功能的算法,但是这些算法运算比较复杂。Seo 等提出了一种简单的算法(SAKA),可以抵抗中间人攻击,并且运算简单。但是SAKA 以及其的增强算法均有缺陷,该文提出了一种改进算法,在具有原有协议优点的同时可以避免这些缺陷。

关键词: 密钥协商;认证;中间人攻击