首页> 外文会议>International Conference on Recent Advances in Information Technology >Security weakness of a lattice-based key exchange protocol
【24h】

Security weakness of a lattice-based key exchange protocol

机译:基于格子的关键交换协议的安全弱点

获取原文
获取外文期刊封面目录资料

摘要

A key exchange protocol is an important primitive in the field of information and network security and is used to exchange a common secret key among various parties. A number of key exchange protocols exist in the literature and most of them are based on the Diffie-Hellman (DH) problem. But, these DH type protocols cannot resist to the modern computing technologies like quantum computing, grid computing etc. Therefore, a more powerful non-DH type key exchange protocol is required which could resist the quantum and exponential attacks. In the year 2013, Lei and Liao, thus proposed a lattice-based key exchange protocol. Their protocol was related to the NTRU-ENCRYPT and NTRU-SIGN and so, was referred as NTRU-KE. In this paper, we identify that NTRU-KE lacks the authentication mechanism and suffers from the man-in-the-middle (MITM) attack. This attack may lead to the forging the authenticated users and exchanging the wrong key.
机译:密钥交换协议是信息和网络安全领域的重要原始,用于在各方之间交换公共密钥。文献中存在许多关键交换协议,其中大多数基于Diffie-Hellman(DH)问题。但是,这些DH型协议不能抵抗量子计算,网格计算等的现代计算技术,因此,需要更强大的非DH型密钥交换协议,这可能抵抗量子和指数攻击。 2013年,雷和廖,因此提出了一个基于格子的关键交换议定书。他们的协议与NTRU-CORRYPT和NTRU-SIGN有关,因此称为NTRU-KE。在本文中,我们识别NTRU-ke缺乏认证机制,遭受中间人(MITM)攻击。此攻击可能导致伪造经过身份验证的用户并交换错误的密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号