Font Size: a A A

Deniable Authentication And Key Exchange Protocol To Achieve

Posted on:2008-02-08Degree:MasterType:Thesis
Country:ChinaCandidate:D M CengFull Text:PDF
GTID:2208360245962007Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Only under the conditions of secure communication provided by open networks can various commercial activities, transaction management and services be implemented. Using cryptographic techniques is an effective way to ensure communication security in open networks. Encryption, digital signature and password-based authentication are some fundamental cryptographic techniques to implement secure communication. However, even the most basic cryptographic technique still has elusive and serious problems of security in its application. And it is not enough for many applications only by using basic cryptographic techniques. As the research of modern cryptology makes phenomenal progress and the field of research gets increasingly wide and deep, authenticated protocols must have many practical problems which need to be solved in their practical applications. Studying authenticated key exchange protocols is to further implement integrity of communication.As E-commerce, transaction processing and service forms become more complicated, the demand for secure communication in open networks increases rapidly, and the requirement for authenticated key exchange protocols also become increasingly comprehensive. Confronted with various attacks, authenticated protocols need constant improvement and update for their security. The protocol which is finally implemented should not only be appropriate and practical but also definitely establish strong security.Basic authenticated protocols include message authentication, entity authentication and password-based authentication technologies and other important authenticated key establishment technologies. Authentication is a process of communication to verify the authenticity and integrity which are claimed by the other side of communication and the communicated message. The public and verifiable signature technique can implement undeniability and unforgeability, and authenticity can be simply implemented by using this technique. But deniability is needed while unforgeability is needed in many cases. For example, in such cases as electronic election, commercial negotiation and online shopping, security property cannot be implemented by using simple signature techniques. So it is very significant and necessary to make further study on and implementation of deniable authentication and key protocols. This paper mainly makes an experimental analysis on the correctness, feasibility and high-efficiency of the deniable key exchange protocol put forward.
Keywords/Search Tags:Key Exchange Protocol, Encryption, Deniability, Authentication, Electronic Signature
PDF Full Text Request
Related items