【24h】

An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack

机译:抗字典攻击的经过身份验证的密钥协商协议

获取原文
获取原文并翻译 | 示例

摘要

Recently, Lee-Lee pointed out that Hsu et al.'s key agreement scheme suffers from a modification attack and described an enhancement on it. Both of Lee-Lee's enhancement and Hsu et al. scheme can be considered as variants of Dime-Hellman scheme with user authentication that are based on a shared-password for providing authentication. This paper shows both schemes cannot withstand to a dictionary attack. Such an attack illustrates that extreme care must be taken when passwords are combined to provide user authentication in cryptographic protocols. This paper also presents a new authenticated key agreement protocol that is not secure to the dictionary attack but also has many desirable security properties, including forward secrecy and known-key secrecy. It is also able to withstand to both passive and active attacks. The security of the proposed scheme is based on the well-known cryptographic assumptions.
机译:最近,Lee-Lee指出,Hsu等人的密钥协商方案遭受了修改攻击,并描述了对其的增强。 Lee-Lee的增强和Hsu等人。可以将该方案视为具有用户身份验证的Dime-Hellman方案的变体,该方案基于用于提供身份验证的共享密码。本文显示了两种方案都无法承受字典攻击。这种攻击说明,密码组合在一起以提供密码协议中的用户身份验证时,必须格外小心。本文还提出了一种新的经过身份验证的密钥协商协议,该协议对字典攻击不安全,但也具有许多理想的安全属性,包括前向保密性和已知密钥保密性。它还能够抵御被动和主动攻击。所提出的方案的安全性是基于众所周知的密码学假设。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号