Font Size: a A A

Authenticated Key Agreement Protocol

Posted on:2008-04-01Degree:MasterType:Thesis
Country:ChinaCandidate:F ZhaoFull Text:PDF
GTID:2208360245962006Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In this thesis, the authentication key exchange protocol and its related questions is dicussed. The main topic of this thesis is focus on three aspects: authentication and key exchange protocol, crypto-algorithm realization, and authentication key exchange protocol realization. We studied one kind of method which is uesed to prove the security based on ECC authentication key negotiation protocl - SEAK agreement security.First, The password based authentication and its related issues is introduced. The public key and the PKI is also analyzed. Some common attacks in secure protocol and information system is addressed as well.Second, the SAKA protocol is also analyzed. Because the secueity of this protocol is based on a long term shared key, it isat the risk of key leakage. Therefore, we analyzed a ECC based secure protocol, SEAK. In SEAK, the authentication of the initial relies on the shared key, but the authentication of the responder only relies on the session key which is generated by hashing on the shared secrete key, the long term private key, and the temporary public key. Therefore, this new authentication protocol is free of key leak.Finally, this theisi also discuss how to design a secure authentication key exchange protocol. Our primary research works are as followings:(1) Beginning with three attack models, three kinds of security model in croptograph is analyzed. We also discussed which security model shoud be used in symmetrical and asymmetrical cryptograph.(2) By attaching a secueity protocol, we confirmed that it is not enough to adopt secure cryptograph while designing a secueity protocol. Then, we discussed how to design a secure key exchange protocol by providing authentication and confidentiality. We conclude that two condition musd be satisfied: providing some special elements and the elements must be protected.(3)According above primary research results, we proposed some improvement schemes for Yahalom and Needham-Schroeder protocol. (4)The secueity of Yahalom and Needham-Schroeder key exchange protocol is analyzed.
Keywords/Search Tags:key exchange protocol, authentication and key exchange protocol, security
PDF Full Text Request
Related items