Font Size: a A A

Cryptoanalysis Of Identity-based Non-interactive Key Distribution With Forward Security

Posted on:2016-06-05Degree:MasterType:Thesis
Country:ChinaCandidate:R RenFull Text:PDF
GTID:2308330473457810Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the information technology is developing rapidly and the technique of computer network is widely applied, the information security issue is becoming more important, and has become a hot research subject at home and abroad in the field of computer and network application. Key agreement is the fundamental of cryptography, it is also an important research content in the field of information security,Key focus of the agreement is to establish a session key.The establishment of session key is a vital technical support for the attempt to communicate safely over an insecure channel, which owns great application value in the networks and booming electronic businesses. The Identity-basedKey Distribution with is one of the protocols used widely in recent years, which has been applied and developed in many fields. This thesis, the further study focuses on the non-interactive forward secure key agreement based on identities, the specific work is listed as follows:Analyzing the fundamental research problems of key agreement protocol, domestic and foreign research production, and some concrete use cases, as well as the encryption algorithms, digital signatures, Hash function, bilinear mapping in cryptography, the public key cryptosystem with its classification, knowledge of ID-based cryptography, pseudo random bit generator and ID-based non-interactive key distribution and encryption scheme.Analyzing the ID-NIKD protocol proposed by Steinwandt and Corona, and the possibility of success of the attacker in the simulated attack game when matching the definition. The analysis IBE mechanism and its security which presented in the ID-NIKD protocol based on key evolutionSteinwandt and Corona gives the IBE scheme relies on its security protocol ID-NIKD.Finding out the secure defects of the ID-NIKD protocol and analyzing its security level in the security model, repeating the same work on IBE protocol, and pointing that the protocol doesn’t meet the requirements in the security model.Finally, Points out how to construct a forward secure key transport protocol is still an open question, and points out that pointing out the development direction of the key agreement protocol and the one based on identities.
Keywords/Search Tags:identity based, non interactive, forward security, key distribution
PDF Full Text Request
Related items