【24h】

Security of Indirect-authenticated Key Exchange Protocol

机译:间接验证密钥交换协议的安全性

获取原文

摘要

Security issues play an important role in modern communication worlds. Via distrusted networks, exchanged messages need to be encrypted by a session key for security requirements. Session keys are preferred to be generated by communication parties, and how to authenticate the other communication party is an important problem needed to be solved. In three-party encrypted key exchange (3PEKE) protocols, a special type of indirect-authenticated protocols, a trusted third party is involved to have two communication parties be able to authenticate each other and negotiate one session key. In 2008, Yoon and Yoo proposed a three-party encrypted key exchange protocol and claimed their protocol provides a more secure way for exchanging messages. Unfortunately, we find that their protocol suffers from undetectable one-line password guessing attacks. In this manuscript, we first review the important related works and show how to mount attacks on Yoon and Yoo's 3PEKE protocol.
机译:安全问题在现代通信世界中发挥着重要作用。通过不信任的网络,交换消息需要由会话密钥进行加密以进行安全要求。会话密钥优选由通信方生成,以及如何验证其他通信方是所需的重要问题。在三方加密密钥交换(3PEKE)协议中,一种特殊类型的间接验证协议,可信的第三方涉及有两个通信方能够相互身份验证并协商一个会话密钥。 2008年,Yoon和Yoo提出了一个三方加密关键交换协议,并声称他们的协议为交换消息提供了更安全的方式。不幸的是,我们发现他们的协议遭受了不可思来的单行密码猜测攻击。在本手稿中,我们首先审查重要的相关工程,并展示如何在yoon和yoo的3peke议定书中掌握攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号