Font Size: a A A

Security Protocols: Theory And Applications

Posted on:2007-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:X F CaoFull Text:PDF
GTID:2178360182477707Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The development of Internet provides its users with more freedom in communication. However, the inborn nature of openness of internet leaves it with various security attacks. How to resist the security attacks and to ensure secure communication is the target of security protocols which should analyze the security requirements according to application environments. The encryption and signature techniques provide security protocols with alternatives of various time complexity and computation complexity; the development of authentication frameworks provide with various authentication infrastructures; formal analyses help to discover the flaws in the protocols.The main results of this thesis are as follows:The security requirements in Mobile IP registration of B3G system are studied, according to which a Mobile IP registration scheme is proposed. Based on ID-based asymmetric cryptography from pairings, our registration scheme realizes the mutual authentication among Home Agent, Foreign Agent and Mobile Node. Our scheme also establishes the session key and provides the location privacy of mobile node.The flaws in deniability within SIGMA protocols are discovered by Kailar logic. Then we remedy the flaw in our new deniable protocols which provide mutual authentication, key agreement and deniability based on Diffie-Hellman algorithm.Third, an improvement to the assumptions of formal logics Kailar logic is proposed which can eliminate the flaws caused by assumptions during formal analyses.
Keywords/Search Tags:Security protocol, Authentication, Key establishment, Formal logics
PDF Full Text Request
Related items