Font Size: a A A

Two Types Of Security Key Exchange Protocol

Posted on:2017-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y WangFull Text:PDF
GTID:2348330482976784Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
Science and technology promote the development of the cryptography since the emergence of cryptography.Until now,cryptography has permeated all aspects of the whole society.An important research field in computer information security is the cryptographic technique.Nowadays,people's personal information has become no longer confidential,such as phone numbers,home addresses and ID numbers,and even has become easy to be obtained.Because of the popularity of the network,our information has the risk of being invaded and destroyed at any time.A safe and effective approach is needed urgently to prevent this from happening,and undoubtedly the cryptographic technique is the best choice.Applying the cryptographic technique to key exchange protocol gives very powerful support to information protection.Two types of password-based authentication and key exchange protocol are studied in this thesis.The main contents are:(1)Using a smart card as an intermediary,a new protocol is proposed for authentication of the anonymity of mobile users.The process of authentication between an external network user and a registered external network user carries out firstly,and then a session key is established.Security analysis is given in the end of the chapter 3,it is showed that the proposed agreement can still be safe to interact under a variety of attacks.(2)By reducing the number of servers,the key password-based exchange protocol can allow the two parties to establish a session key in the single-server.Replacing authenticated key exchange protocol by password-based authentication protocols,the identification-based authentication between the users is reduced.This thesis is organized as follows:In chapter 2,some basic cryptography knowledge,including algebra and number theory,is provided.In chapter 3,firstly some basic conditions of the authenticated key exchange protocol are introduced.Secondly,the design principles of cryptographic protocol are given.Finally,a secure smart card based identity authentication protocol is proposed,and security analysis is given.In chapter 4,the research of password-based authenticated key exchange protocol and the prior to password verification are briefly described.And then the key exchange protocol of the password-based authentication with single server is introduced.Finally,security analysis is given.In chapter 5,two types of key exchange protocols are summarized respectively,and the future research directions of key exchange protocol are given.
Keywords/Search Tags:identity authentication, smart card, password, key exchange protocol
PDF Full Text Request
Related items