Font Size: a A A

Research On Three Universal Strong Cryptographic Primitives And Protocols

Posted on:2022-04-24Degree:MasterType:Thesis
Country:ChinaCandidate:X T WangFull Text:PDF
GTID:2518306482955119Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Key agreement protocol is a basic element in cryptography and an important content in the field of information security.The key of key agreement protocol is to establish session key,so it plays an important role in communication network and other services.Authentication protocols are used to provide credibility for the identity information between two or more parties in communication and are a necessary process for key negotiation between each participant.The purpose of key negotiation is to help participants provide various security services and meet various security requirements.In this paper,three universal strong cryptographic primitives and protocol generation algorithms and their related applications are deeply studied and analyzed.This paper describes the key research issues of key agreement protocol,the research results at home and abroad,the specific application cases and shortcomings of key agreement protocol.The algorithm,Hash function and other related knowledge in cryptography are summarized.The main research contents and innovations of this paper are as follows:1.Research on optimal round authentication key agreement protocol with strong forward securityOn the basis of the whole round PAKE protocol framework,a provable secure and flexible single round PAKE scheme based on chaotic mapping is proposed.On the basis of a new type of attack against key exchange protocols,namely the strong key compromise simulation attack(SKCI),a strong security model for key exchange protocols is proposed.In order to provide a secure key exchange protocol in this model,a strong secure round key exchange protocol based on MOT protocol is proposed.This new attack and new security model provide a new topic for analyzing the security of key exchange protocol.Further work will be to design a secure round key exchange protocol with computational cost similar to Diffie-Hellman key exchange protocol.2.Research on lightweight protocols based on physical unclonability and privacy protectionThe two key agreement protocol based on PUF algorithm design,one is a tripartite key agreement protocol,the other is a group key agreement protocol,it is on the basis of the two key agreement protocol extensions,can be based on a more practical environment,is no longer a single key agreement between the user and the server,the agreement not only inherited the merits of the two key agreement,and is a kind of innovation.In addition to authenticating between the user and the server,the bilateral key protocol can resist guesswork attack,off-line password attack,support mutual authentication,and provide privacy protection for users.This protocol has strong security and enforceability,which enriches the types of key protocols.3.Research and design of privacy segmented group key authentication and negotiation protocol based on passwordA PPP-GPAKE protocol is proposed.The protocol combines the key exchange protocol based on group password with confidentiality and partition security to tolerate users entering wrong passwords.The first key idea is to use a temporary database to keep the scheme private,and the second is to use subgroups to calculate the middle two-party session key to tolerate some incorrect passwords entered by users.The proposed scheme does not need to share the secret key in advance,and the proposed protocol is more practical and secure under the random prophecy model.In the future,we will study the PPP-GPAKE protocol under the standard model,and give PPP-GPAKE higher security and higher efficiency.
Keywords/Search Tags:Key exchange, privacy protection, authentication, key leakage simulation
PDF Full Text Request
Related items