Font Size: a A A

Research And Design Of Authenticated Key Agreement Protocols

Posted on:2012-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:W G LiuFull Text:PDF
GTID:2178330335453092Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, emerging various hazards events, the network security situation is worsening. Especially in the areas of financial systems and e-commerce, the advantage of cryptographic technology is more important. When entities would like to establish a session key, it is a critical problem that how to effectively authenticate among entities in the information assurance system.This paper adopts elliptic curve cryptography technology as our mathematical basis tool. Meanwhile, we analyze the efficiency, authentication and security proof of several previous known key agreement protocols in detail, and propose two new authenticated key agreement protocols; the proposed authenticated key agreement protocols can provide the theoretical reference for the application of cryptographic technology in practice.Nowadays, many researchers have proposed lots of two or multiparties authenticated key agreement protocols based on DH to solve the problems which exist in previous key agreement protocols. However, many key agreement protocols still have some flaws. In this paper, we analyzed some latest research papers in detail, and pointed out the security flaws in it, and then we gave the improved version of them. Besides, we proposed a new efficient tripartite authenticated key agreement protocol and analyzed its security using heuristic method. The research results of this paper are illustrated as follows:Firstly, for two-party authenticated key agreement protocols, this paper analyzed some latest key agreement protocols detailedly from the security performance, communication overhead and computational overhead and so on. In particular, we analyzed the security of the SKA protocol. The analysis results showed that the SKA protocol can not satisfy the perfect forward secrecy, and can not effectively resist the ephemeral key exposure attack and the long-term temporary private key exposure attack. Then, we brought forward an improved version of SKA protocol and proposed a new authenticated key agreement protocol based on signcryption. The proposed protocol not only can improve the efficiency of key agreement protocol, but also satisfy the desirable security properties of the existing variety of authenticated key agreement protocols.Secondly, in terms of the tripartite authenticated key agreement protocols, we use the same method to analyze the tripartite authenticated key agreement protocol, including the rounds of key agreement, the number and the bit length of the transmited messages. Under the same parameters condition, we compared their security performance and efficiency, and pointed out that the IDAK3-P1 protocol cannot resist the passive attacks and the other corresponding attacks. Finally, we made use of Schnorr signature to generate the public key and the corresponding private key for each user, and proposed a new cross-domain commuication identity-based tripartite authenticated key agreement protocol. Compared with the other same type key agreement protocols, the proposed protocol has obvious advantages in efficiency and other security properties. The proposed protcol can resist the existing various types of attacks of tripartite authenticated key agreement protocol, so it has a good theoretical reference value.
Keywords/Search Tags:Signcryption, Identity-based Cryptography, Authenticated key agreement, Security Attributes, Bilinear Pairings
PDF Full Text Request
Related items