首页 | 本学科首页   官方微博 | 高级检索  
     检索      

两个eCK模型下可证安全的密钥交换协议分析
引用本文:程庆丰,马传贵,胡学先.两个eCK模型下可证安全的密钥交换协议分析[J].武汉大学学报(理学版),2010,56(2).
作者姓名:程庆丰  马传贵  胡学先
作者单位:1. 信息工程大学,信息研究系,河南,郑州,450002;解放军外国语学院基础部,河南,洛阳,471003
2. 信息工程大学,信息研究系,河南,郑州,450002
基金项目:国家高技术研究发展计划(863)项目(2009AA01Z417); 河南省重大科技攻关项目(092101210502)
摘    要:基于eCK(extended Canetti-Krawczyk)模型的定义,针对eCK模型下证明安全的两个密钥交换协议进行了分析.结果显示两个密钥交换协议在eCK模型中都是不安全的,其中SAKA(secure authenticated key agree-ment)协议不能抵抗临时密钥泄露攻击也不能抵抗长期密钥泄露攻击,并且不具有前向安全性.另一个SHY(Shi-Huang-Yang)协议不能抵抗两方临时密钥同时泄露的攻击.

关 键 词:密钥交换  eCK模型  计算Diffie-Hellman(CDH)假设  双线性Diffie-Hellman(BDH)假设  

Analysis of Two Provably Secure Authenticated Key Exchange Protocols in the eCK Model
CHENG Qingfeng,MA Chuangui,HU Xuexian.Analysis of Two Provably Secure Authenticated Key Exchange Protocols in the eCK Model[J].JOurnal of Wuhan University:Natural Science Edition,2010,56(2).
Authors:CHENG Qingfeng  MA Chuangui  HU Xuexian
Institution:CHENG Qingfeng1,2,MA Chuangui1,HU Xuexian1(1.Department of Information Research,Information Engineering University,Zhengzhou 450002,Henan,China,2.Department of Basic Courses,PLA University of Foreign Languages,Luoyang 471003,China)
Abstract:The extended Canetti-Krawczyk(eCK) model proposed by LaMacchia et al.is currently regarded as the strongest security model for authenticated key exchange(AKE) protocols.In the eCK model,the adversary can make queries on the test session,and reveal both ephemeral private keys,both long-term keys,or one of each from the two different parties.In this paper,we analyze two AKE protocols designed in the eCK model based on the definition of eCK model.We propose ephemeral keys compromised attacks and long-term keys...
Keywords:authenticated key exchange  eCK model  computation Diffie-Hellman(CDH) assumption  bilinear Diffie-Hellman(BDH) assumption  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号