Font Size: a A A

Research On ID-based Authenticated Agreement Protocols

Posted on:2015-12-31Degree:MasterType:Thesis
Country:ChinaCandidate:T T ZouFull Text:PDF
GTID:2308330473454742Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology and the widespread application, ShiXieMi events emerge in endlessly, network security problem is becoming more and more people pay attention to. Cryptographic protocols is one of the most effective means to solve the problem of network information security. To conduct the research on authentication key agreement protocol not only in the field of cryptography and information security is of important theoretical significance, but also in computer communication network applications, and a variety of emerging has important application value in electronic business. Based on sun-style protocol as an example, this paper combined with the latest theoretical research progress, in view of the safety defects existing in the agreement to make the corresponding improvement.Finally, this paper also designs a new efficient identity authentication key agreement protocol, and using the heuristic analysis method on the safety analysis. The specific research results are as follows:1、to both identity authentication key agreement protocol development and research status are summarized, describes the concept of key agreement protocols, security features, design principles, etc. The famous authentication key agreement protocol are described and analyzed.2、the domestic sun-style SSZP protocol is analyzed and improved. In this paper, its security are analyzed in detail, which indicates that the agreement does not meet the key leak resistance against the security attributes of disguise. Paper describes in detail according to the agreement of key leaked camouflage attack process. Finally, in view of the SSZP agreement of the above safety defects, puts forward the improved protocol(SSZP + protocol). For new protocol analysis shows that in view of sun-style SSZP key leaked feinting to SSZP + agreement will become no longer valid.3、on the basis of the former two parts work, the paper puts forward a new secure and efficient authentication based on both sides of the key agreement protocol-- IDAK.Relative to the implementation of change agreement program are presented, and the strict test, the test results relative to the previous analysis of several protocols have greatly improved.Analysis shows that this protocol not only keep the with Smart exactly the samecomputational efficiency, but also satisfy the security properties. By agreement with the other involved in terms of computational efficiency and security properties after detailed comparison, the proposed protocol in computational efficiency and safety reached a good balance, have very strong practicability.
Keywords/Search Tags:identity-based, authentication, key agreement bilinear, pairing key-compromise impersonation attack
PDF Full Text Request
Related items