Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2009, Vol. 35 ›› Issue (20): 151-152.

• Security Technology • Previous Articles     Next Articles

Authentication Protocol Suit for Restriction Environment and Its SVO Logic Analysis

LIU Zhi-meng, ZHAO Yan-li, FAN Hui, YUAN Da   

  1. (College of Computer Science and Technology, Shandong Institute of Business and Technology, Yantai 264005)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-10-20 Published:2009-10-20

适应受限环境的认证协议及其SVO逻辑分析

刘志猛,赵燕丽,范 辉,原 达   

  1. (山东工商学院计算机科学与技术学院,烟台 264005)

Abstract: Aiming at the application and security problem of authentication protocol in restriction communication environment, this paper presents an authentication protocol based on elliptic curve cryptographic techniques, in which data confidentiality of exchanged information is supported by symmetric cryptography. The conversation key shared by participants is generated in the end of the protocol. Formal anlysis is done on recommended protocol by using extended SVO logic and the security of the protocol is proved by the results.

Key words: security protocol, identity authentication, conversation key, SVO logic, logic analysis

摘要: 针对认证协议在受限通信网络环境中的应用和安全问题,提出一种基于椭圆曲线密码技术的认证协议,使用对称密码为协议中的交互信息提供机密性,在协议最后生成参与者共享的会话密钥。采用扩展的SVO逻辑对推荐协议进行形式化分析,结果证明该协议的安全性符合要求。

关键词: 安全协议, 身份认证, 会话密钥, SVO逻辑, 逻辑分析

CLC Number: