Font Size: a A A

Password-based Key Agreement Protocol Design And Analysis

Posted on:2009-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:T LiuFull Text:PDF
GTID:2208360275982933Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Identity authentication protocol, or named Identity verification protocol, is a kind of secure communication protocol for participants in computer network or distributed systems to identify the communicate object by cryptographic algorithm. A good identity authentication protocol should posses the following points: first, the protocol can verify the identity of communication partner correctly; second, it will make sure who is the duty officer and signed to avoid repudiation; finally, a food protocol can ensure the data's security during store or transmission. There are several kinds of protocol such as Challenge-Response Protocol, Zero-Knowledge Proof protocol, Digital Signature Algorithm Protocol, Kerberos Authentication protocol, X.509 Authentication Protocol and so on.Elliptic Curve Cryptosystem (ECC) is rests on the difficulty of solving the discrete logarithm problem over points on an elliptic curve. Compared with other public key cryptosystems, the ECC is much safer and its key length is shorter, which will decrease the processing amount of the center computer and reduce the storage space. It is suitable be used in confined environments privacy systems.By analyzing and summarizing the existing proposals, a new kind of passwords key agreement protocol based on ECC is proposed in this paper, which can realize the identify authentication of the communicating pair, and establish the shared session key. As it can resist masking attack, man in middle attack, replay attack etc, it can be applied to secured communication on the Internet.
Keywords/Search Tags:elliptic curve cryptography, identity authentication, passwords, key agreement
PDF Full Text Request
Related items