Font Size: a A A

Research And Design Of Several Security Protocols

Posted on:2011-06-19Degree:DoctorType:Dissertation
Country:ChinaCandidate:M L DengFull Text:PDF
GTID:1118360305464267Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid growth of network applications, network security has become an important issue. Security protocols works as a kind of the kernel technology for the secure network communication,thus their correctness and security are very crucial to network security. In recent years, the design and analysis of security protocols has become one of the most active research topics in the field of network and information security.For lack of time and space, the password-based security protocols, electronic payment protocols and security protocols for radio frequency identification (RFID) are studied in this thesis.Firstly, based on the strand space model, these standard strands of the attacker were extended for the purpose of analyzing the guessing attack. A kind hash function was used for resisting guessing attacks in a two-party password-based security protocol. A formal analysis of the modified protocol shows that it can prevent guessing attacks.Secondly, an ideal functionality of three-party password-authenticated key exchange was defined in the universal composability model,and a three-party password-authenticated key exchange protocol was constructed to realize this ideal functionality in the hybrid model which aided by two-party password-authenticated key exchange ideal functionality. The proposed protocol is universally composable, and has simpler structure.Thirdly, fairness is an essential property in electronic payment protocol. An ideal functionality of fair electronic payment was defined in the universal composability model. In the hybrid model which aided by ideal convertible signature functionality, ideal registration functionality and ideal secure session functionality, a fair electronic payment protocol was constructed to realize this ideal functionality. The new protocol has simpler structure and lower communication overhead.Fourthly, safety requirements for RFID protocols were analyzed and a low cost anonymous authentication protocol for RFID was proposed based on the universal composability mode. The implementation of this protocol is feasible for a wide range of RFID architectures. Recently proposed EPCGen2 compliant security protocols were analyzed, and the design principles of EPCGen2 compliant authentication protocols were given. A new RFID authentication protocol based on the EPCGen2 standards was also proposed. Safety requirements for RFID search protocols were analyzed, and a low cost RFID search protocol was proposed without the need for a bake-end database. Security requirements for RFID communication protocols in supply chain environments were analyzed, and a new secure RFID communication protocol in supply chains was proposed. The new protocol imposes lower computation load and storage cost on RFID tags and has higher efficiency.Fifthly, the strand space model was extended so that it can be applied to analyze untraceability of tags in RFID protocols. Based on the extended strand space model, Feldhofer protocol and O′-FRAP protocol were analyzed.
Keywords/Search Tags:security protocol, password, electronic payment, radio frequency, identification untraceability
PDF Full Text Request
Related items