Font Size: a A A

Design Of Two Key Agreement Protocols

Posted on:2021-03-22Degree:MasterType:Thesis
Country:ChinaCandidate:B Q NingFull Text:PDF
GTID:2428330629483976Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The flourishing development of computer networks marks that people have entered an information age.With the development of science and technology,the Internet has been integrated into all aspects of people's work and life,and the network has become an important tool to promote social development.However,using a computer generates a lot of information.How to keep information secret,transmission and storage secure has become the focus of scholars' research.Cryptography theory is the core and cornerstone of information security,which is of great significance to the confidentiality,transmission and storage of information.Key agreement protocols are an important part of cryptography.It means that two or more parties generate a shared session key in an unsecured public data network in a certain way to achieve mutual communication security.In 1984 s,Diffier-Hellman proposed a two-party key agreement protocols,but it cannot resist middle-intrusion attacks.Subsequently,many secure and efficient two-party key agreement protocols were proposed,but these protocols are aimed at two users in the same domain.Not applicable for communication between users in different domains and large-scale networks.As a result,two-party key agreement protocol in different domains' users,three-party key agreement protocol and group key agreement protocols have become hot research topics.The article is based on Wang Zhen etc proposed two-party authenticate key agreement protocol and Orhan Erimis etc proposed group key agreement protocol in mobile ad hoc networks.Which is based on the difficulty assumptions of several type of mathematical problems.Research the application of identity-based two-party cross-domain authenticate key agreement protocol and improved group key agreement protocol in mobile ad hoc networks,complete tasks as following:1.We generalizes the identity-based two-party key agreement protocol to users between two different domains,and proposes a new identity-based two-party cross-domain authentication key agreement protocol.Under the random oracle model,the security of the new scheme is proved.Compare with similar schemes at the same time.2.In mobile ad hoc networks,an improved group session key agreement protocol was proposed.This protocol has excellent features such as authentication,cluster head selection and dynamic group operation.Compare with other MANETs protocols,this protocol has more secure and more efficient.
Keywords/Search Tags:Public key cryptosystem, identity-based cryptosystem, mobile ad hoc networks, authenticate, two-party cross-domain key agreement protocol, group key agreement protocol
PDF Full Text Request
Related items