当前位置:主页 > 科技论文 > 信息工程论文 >

移动网络中认证密钥协商协议的研究

发布时间:2018-03-05 00:34

  本文选题:密钥协商 切入点:椭圆曲线密码体制 出处:《武汉大学》2017年硕士论文 论文类型:学位论文


【摘要】:随着智能手机的不断普及,人们越来越多地使用移动网络来进行通信、购物、理财,这也使移动网络的安全问题更加受人关注,如何构建出一个适用于性能较低的移动设备的安全协议成为一个非常重要的问题。密钥协商协议是解决网络通信安全问题的一个常用方法,在进行会话之前,通信双方使用密钥协商协议进行互相认证并且协商一个临时的会话密钥,然后用该会话密钥对通信的消息进行加解密,达到通信安全性。密钥协商协议自提出以来,得到不断的研究与发展,逐步演化出了多个不同的种类。其中基于身份的密钥协商协议避免了传统公钥加密体制中的密钥管理问题,基于ECC的密钥协议具有更高的效率。基于身份和ECC的密钥协商协议同时具备二者的优点,是解决移动网络通信安全问题的一个好选择。Farash等人在2014年提出了一个基于身份和ECC的密钥协商协议,该协议能够抵抗KCI攻击且具有完美前向安全性。随后Shi等人指出Farash等人的协议存在服务器模仿攻击漏洞,并提出了一个新的用户注册协议。然而我们发现Shi等人的协议仍不能抵抗服务器模仿攻击。为了解决这个问题,我们在服务器的认证消息中添加了一个随机值,简化了用户私钥,在此基础上提出了一个新的客户端-服务器两方认证密钥协商协议,并在随机预言机模型下证明了新协议能提供客户端和服务器之间的互相认证和会话密钥的不可区分性。此外,本文还对新协议的安全特性进行了分析,证明了新协议具有已知会话密钥安全性、完美前向安全性,能抵抗密钥泄露模仿攻击、未知密钥共享攻击和重放攻击,且不存在密钥控制。另外我们将新协议和近几年提出的五个相关协议在安全性和性能两个方面进行了比较,比较结果表明,我们的协议不仅在安全性方面有所提升,且具有更高的计算效率。为了验证协议在真实环境中的确实可行性,本文使用Bouncy Castle加密组件和SHA-256来实现协议中的加密算法,将新协议在Windows系统和Android系统下进行了实现。实验运行结果表明,新协议在实际环境中是正确可行的,且计算开销较小,适用于性能较低的移动设备。
[Abstract]:With the increasing popularity of smart phones, more and more people use mobile networks to communicate, shop and manage money, which makes the security of mobile networks more concerned. How to construct a security protocol suitable for low performance mobile devices becomes a very important problem. Key agreement protocol is a common method to solve the security problem of network communication. The two sides of the communication use the key agreement protocol to authenticate each other and negotiate a temporary session key, and then use the session key to encrypt and decrypt the message of the communication to achieve communication security. With the continuous research and development, many different types have evolved gradually, among which the identity-based key agreement protocol avoids the problem of key management in the traditional public key encryption system. The key protocol based on ECC has higher efficiency. The key agreement protocol based on identity and ECC has the advantages of both. It is a good choice to solve the security problem of mobile network communication. Farash et al proposed a key agreement protocol based on identity and ECC in 2014. The protocol is resistant to KCI attacks and has perfect forward security. Shi et al later pointed out that Farash et al.'s protocol has a server impersonation vulnerability. A new user registration protocol is proposed. However, we find that Shi et al can not resist server impersonation attacks. In order to solve this problem, we add a random value to the authentication message of the server. Based on the simplification of the user's private key, a new client-server authentication key agreement protocol is proposed. It is proved that the new protocol can provide mutual authentication and indistinguishable session key between the client and the server under the random oracle model. In addition, the security characteristics of the new protocol are analyzed. It is proved that the new protocol has known session key security, perfect forward security, and can resist key leak simulation attack, unknown key sharing attack and replay attack. In addition, we compare the new protocol with the five related protocols proposed in recent years in terms of security and performance. The results show that our protocol not only improves the security, but also improves the performance of the new protocol. In order to verify the feasibility of the protocol in real environment, this paper uses Bouncy Castle encryption component and SHA-256 to implement the encryption algorithm in the protocol. The new protocol is implemented in Windows system and Android system. The experimental results show that the new protocol is correct and feasible in the actual environment, and the computation cost is small, so it is suitable for mobile devices with low performance.
【学位授予单位】:武汉大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.4

【相似文献】

相关期刊论文 前10条

1 张振文;宋海刚;洪流;陈学广;;基于提议信息保护下的多属性协商协议研究[J];计算机应用研究;2009年12期

2 张永弟;杨光;李荣廷;;带有时间令牌的多步反复协商协议在异地协同制造合作伙伴选择中的应用[J];机械设计与制造;2007年11期

3 郑明辉;崔国华;;一种基于口令认证的高效组密钥协商协议[J];武汉理工大学学报;2010年20期

4 祝烈煌;曹元大;廖乐健;;一种可认证的群组密钥协商协议[J];计算机工程与应用;2006年S1期

5 崔国华;郑明辉;粟栗;;一种抗阻断攻击的认证组密钥协商协议[J];计算机科学;2008年01期

6 钟欢;许春香;;基于身份的多方认证组密钥协商协议[J];电子学报;2008年10期

7 曹帅;张串绒;宋程远;;基于身份的移动网动态可认证群组密钥协商协议[J];空军工程大学学报(自然科学版);2011年05期

8 刘天华;朱宏峰;;一种基于树结构的分布式组密钥协商协议[J];兵工学报;2012年06期

9 张志军;郭渊博;刘伟;吕金娜;;基于m叉树与DH协议的组密钥协商协议[J];计算机工程;2010年01期

10 潘操;丁辉;王洪元;;一种新的三方认证密钥协商协议[J];微电子学与计算机;2011年07期

相关会议论文 前2条

1 陈达;张e,

本文编号:1568028


资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/1568028.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户bd23b***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com