Font Size: a A A

The Research On Authenticated Key Agreement Protocol And Its Security

Posted on:2007-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:H Q KuangFull Text:PDF
GTID:2178360185465373Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Numerous Diffie-Hellamn based AK and AKC protocol have been proposed, however, many have subsequently been found to have some security flaws. By the Security attributes of AK and AKC protocols defined by Law et al, this paper emphasizes on analyzing some protocols. Firstly, find some security flaws, and new authenticated key agreement protocols are proposed. Secondly, formal models of these prorocols are provided, and then these protocols proposed are proven secure within this framework in the random oracle model. List as follows:Firstly, the SAKA protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long-term shared key, so it does not resist key-compromise impersonation. In this paper, an elliptic curve cryptography based provably-secure authenticated key agreement is proposed, namely, SEAK protocol. In this new protocol, the authentication code of the its initiator depend on the shared long term key, but the authentication code of the its responder relies on session key, and the session key is a hashed value of concatenation of the long-term shared key, the scalar multiplication of the long-term private key and ephemeral public key, and the scalar multiplication of the private key and long-term public key, which ensure that the protocol resists key-compromise impersonation. Also, heuristic analysis of security and performance analysis are made on the SEAK protocol, and an appropriate formal model is provided, the protocol is proven secure in ECCDH and the random oracle model.Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation. In this paper, an ECC based provably-secure AKC is proposed, namely, SAKC protocol. In this new protocol, The key confirmation is incorporated into the authenticated key agreement, and its key confirmation is a hashed value of concatenation of the scalar multiplication of the long-term private key and ephemeral public key, and the scalar multiplication of the private key and long-term public key, which ensure that the protocol achieves forward secrecy, and resists key-compromise impersonation. Also, a heuristic analysis of security and performance analysis is made on the SAKC protocol, and an appropriate formal model is provided, the protocol is proven secure in ECCDH and the random oracle model.Lastly, in the EAGKA protocol that holds n group members, and total key agreements are n ( n -1), so the efficiency of the protocol is very low, when n is...
Keywords/Search Tags:key agreement protocol, authenticated key agreement protocol, group key agreement protocol, provably-secure, key confirmation, random oracle model
PDF Full Text Request
Related items