首页> 外文会议>International Ethical Hacking Conference >Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC
【24h】

Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC

机译:使用加密安全CRC对Imprie-Hellman协议的认证

获取原文

摘要

Diffie-Hellman key exchange (DHKE) protocol, which is also known as exponential key exchange protocol, is one of the practical ways of generating a common secret key between two communicating parties. But this protocol itself is a non-authenticated protocol; hence, the protocol is exposed to man-in-the-middle (MITM) attack. An attacker can easily hijack sender's public value. Attacker calculates his own public value and sends this value to the receiver instead of sending the original value. Attacker does the same thing when receiver replies back to the sender. After this exchange, attacker can decrypt any messages sent by both of the communicating parties. In this paper, a simple authentication mechanism is developed based on the cryptographically secure version of well-known cyclic redundancy check (CRC). A cryptographically secure CRC is capable of detecting both random and malicious errors where the CRC divisor polynomial is randomly generated and secret. A common CRC divisor polynomial is generated for both of the communicating parties. The system is capable of generating cryptographically secure random numbers which are different in every session. Here the length of the divisor polynomial for CRC must be large. In our proposed system, cryptographically secure CRC is combined with the Diffie-Hellman algorithm for checking whether the public value of the sender is changed by an attacker. MITM attack is detected successfully by using only one securely and randomly generated secret nonzero divisor polynomial of cryptographically secure CRC. The length of public keys to be sent in the Diffie-Hellman protocol and modified system are also compared to show the overhead is negligible.
机译:Diffie-Hellman密钥交换(DHKE)协议,也称为指数密钥交换协议,是在两个通信方之间生成共同密钥的实际方法之一。但该协议本身是一个非经验验证的协议;因此,该方案暴露于中间人(MITM)攻击。攻击者可以轻松劫持发件人的公共值。攻击者计算自己的公共值,并向接收器发送此值,而不是发送原始值。当接收器回复发件人时,攻击者会做同样的事情。在此Exchange之后,攻击者可以解密由两个通信方发送的任何消息。在本文中,基于众所周知的循环冗余校验(CRC)的加密安全版本开发了简单的认证机制。加密安全CRC能够检测随机生成CRC除数多项式的随机和恶意错误。为两个通信方生成一个常见的CRC除数多项式。该系统能够在每个会话中生成不同的加密安全随机数。这里,CRC的除数多项式的长度必须大。在我们提出的系统中,加密安全CRC与Diffie-Hellman算法相结合,用于检查发送方的公共值是否由攻击者更改。通过仅一次安全和随机生成的密码安全CRC的秘密非零除录多项式来成功检测MITM攻击。在Diffie-Hellman协议和修改系统中发送的公钥的长度也与显示开销可以忽略不计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号