身份基认证密钥协商协议研究与实现
发布时间:2018-06-24 02:18
本文选题:身份基 + 认证 ; 参考:《电子科技大学》2014年硕士论文
【摘要】:随着计算机网络技术的飞速发展和广泛应用,失泄密事件层出不穷,网络安全问题也变得越来越受人们重视。密码协议是解决网络信息安全问题的最有效手段之一。开展对认证密钥协商协议的研究不仅在密码学和信息安全领域具有重要的理论意义,而且在计算机通信网络应用和各种新兴电子业务中具有重要的应用价值。本文以孙氏协议为例,结合最新的理论研究进展,针对协议中存在的安全缺陷做出了相应的改进。最后,本文还设计了新的高效身份基认证密钥协商协议,并使用启发式分析方法对其进行了安全性分析。具体研究成果如下:1、对双方身份基认证密钥协商协议的发展及研究现状进行了综述,描述了密钥协商协议的概念、安全特性、设计原则等。对著名的认证密钥协商协议进行了描述和分析。2、对国内孙氏SSZP协议进行了分析与改进。本文对其安全性进行了详细分析,表明该协议不满足抗密钥泄露伪装攻击的安全属性。论文详细描述了针对该协议的密钥泄露伪装攻击过程。最后,针对SSZP协议的上述安全缺陷,提出了改进协议(SSZP+协议)。对新协议分析表明针对孙氏SSZP协议的密钥泄露伪装攻击对于SSZP+协议将变得不再有效。3、在前两部分工作的基础上,论文提出了一个新的安全、高效的身份基双方认证密钥协商协议——IDAK协议。给出了实现改协议的相关程序,并进行了严格的测试,测试结果相对前面分析的几种协议有了较大的改进。分析表明,这一协议不仅保持了同Smart协议完全相同的计算效率,而且还满足了应有安全属性。通过与文中所涉及的其它协议在计算效率和安全属性方面进行详细比较之后,新提出的协议在计算效率和安全性方面达到了一个较好的平衡,具有很强的实用性。
[Abstract]:With the rapid development and wide application of computer network technology, leakage incidents emerge in endlessly, and network security issues have become more and more important. Cryptographic protocol is one of the most effective methods to solve the problem of network information security. The research of authentication key agreement protocol is of great theoretical significance not only in the field of cryptography and information security, but also in the applications of computer communication networks and various new electronic services. Taking Sun's protocol as an example, combined with the latest theoretical research progress, this paper makes corresponding improvements to the security defects in the protocol. Finally, a new efficient authentication key agreement protocol is designed, and its security is analyzed by heuristic analysis method. The specific research results are as follows: 1. This paper summarizes the development and research status of the authentication key agreement protocol between the two sides, and describes the concept, security characteristics and design principles of the key agreement protocol. The famous authentication key agreement protocol is described and analyzed, and the Sun's SSZP protocol is analyzed and improved. The security of the protocol is analyzed in detail, which shows that the protocol does not satisfy the security properties of key disclosure camouflage attack. This paper describes the process of key leak camouflage attack against the protocol in detail. Finally, an improved SSZP protocol (SSZP protocol) is proposed for the above security defects of SSZP protocol. The analysis of the new protocol shows that the key leak camouflage attack against Sun's SSZP protocol will no longer be effective for SSZP protocol. Based on the first two parts of the work, this paper proposes a new security. Efficient identity Base Authentication key Agreement Protocol-IDAK Protocol. The related procedures for implementing the protocol are given, and a strict test is carried out. The test results are better than those of the previous protocols. The analysis shows that this protocol not only keeps the same computing efficiency as Smart protocol, but also satisfies the due security attribute. Compared with other protocols in this paper, the proposed protocol achieves a good balance in computing efficiency and security, and has strong practicability.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN918.4
,
本文编号:2059540
本文链接:https://www.wllwen.com/kejilunwen/wltx/2059540.html