|本期目录/Table of Contents|

[1]蔡琼,方旋,方兰.结合公钥密码的密钥协商协议[J].武汉工程大学学报,2012,(11):65-67.[doi:103969/jissn16742869201211014]
 CAI Qiong,FANG Xuan,FANG Lan.Key agreement protocol combine with public key cryptography[J].Journal of Wuhan Institute of Technology,2012,(11):65-67.[doi:103969/jissn16742869201211014]
点击复制

结合公钥密码的密钥协商协议(/HTML)
分享到:

《武汉工程大学学报》[ISSN:1674-2869/CN:42-1779/TQ]

卷:
期数:
2012年11期
页码:
65-67
栏目:
机电与信息工程
出版日期:
2012-12-10

文章信息/Info

Title:

Key agreement protocol combine with public key cryptography
文章编号:
16742869(2012)11006503
作者:
蔡琼方旋方兰
武汉工程大学计算机科学与工程学院,湖北 武汉 430074
Author(s):
CAI Qiong FANG Xuan FANG Lan
School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan 430074,China
关键词:
公钥密码密钥协商协议一次一密
Keywords:
public key cryptography key agreement protocol onetime pad
分类号:
TN118.1
DOI:
103969/jissn16742869201211014
文献标志码:
A
摘要:
针对目前公钥密码体制的计算代价大,并且需要一个可信的数字证书认证机构才能保证密码体制的安全性,同时证书的维护也是安全方面的隐患等问题,提出一种结合动态公钥密码的密钥协商协议.在认证阶段,将生成的随机数同双方事先约定好的信息串接起来计算其哈希值,把此哈希值和随机数一同发送给对方,哈希函数的单向性使得该随机数能够被正确地传输.在加解密阶段,通过结合对方传输过来的随机数来动态改变公钥算法的密钥对,以实现通信过程中的一次一密.相比传统的通过重新生成大素数来改变密钥对的方法提高了效率,最后通过三种最常用的网络攻击手段验证了协议的安全性.
Abstract:
Aiming at the problems that computational cost of the public key infrastructure is large and a trusted certificate authority is prerequisite to ensure the security of the cryptosystem, the maintenance of the certificate is also the hidden danger, a key agreement protocol combined with a dynamic public key cryptography was proposed. During the authentication phase ,the prior shared information and the random number which generated by sender were concatenated and calculated their hash values, then, the hash values and the random number were transmitted to the receiver, the unidirectional hash function ensures the random number being transmitted correctly. During the encryption and decryption phase, the random numbers transmitted from each other was used to change keys of public key algorithm dynamically. This method achieves the onetime pad in the communication, it makes more efficiency than the method which regenerates the large prime numbers to change the keys. The safety of this agreement is verified by using three techniques which are commonly used on the network attack.

参考文献/References:

[1]郑华,郝孟一,王国强. PKICA认证体系在实际应用中的优缺点讨论\[J\]. 网络安全技术与应用, 2002(3): 1621.
[2]廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用\[M\]. 北京:科学出版社, 2009: 1826.
[3]Douglas R.Stinson.密码学原理与实践\[M\].冯登国,译. 北京:电子工业出版社, 2003: 131144.
[4]蔡琼,彭涛,叶杨.一种混沌序列加密算法的密码分析\[J\].武汉工程大学学报,2011,33(6):9497.
[5]Xiang feny Guo, Jiashu zhang. Secure qroup key agreement protocol based on chaotic Hash\[J\]. Information Sciences, 2010(10):40694074.
[6]张蓓,孙世良. 基于RSA的一次一密加密技术\[J\]. 计算机安全, 2009(3): 5355.
[7]齐晓虹.RSA公开密钥密码体制的密钥生成研究\[J\].武汉理工大学学报,2010,32(6):3740.
[8]束妮娜,王亚弟. 关于密码协议攻击的研究\[J\]. 计算机工程, 2005(19): 148150.

相似文献/References:

备注/Memo

备注/Memo:
收稿日期:20120918作者简介:蔡琼(1961),女,湖北武汉人,副教授,硕士.研究方向:网络数据库及数据挖掘.
更新日期/Last Update: