首页> 外文OA文献 >3-party key agreement protocol secure against online and dictionary attacks
【2h】

3-party key agreement protocol secure against online and dictionary attacks

机译:3方密钥协商协议可确保免受在线和字典攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Frequent key changes are must in order to limit the amount of data compromised. Cryp-tography simply can not get o® the ground without e®ective key distribution mechanism. Several key agreement protocols are proposed on password based mechanism. These protocols are vulnerable to dictionary attacks. Traditional 3-party key agreement protcols are vulnerable to insider attacks and server becomes a monitoring centre which we dont want in most of the applications.EKE protocol is vulnerable to Denning-Sacco attacks. EKE demands storing clear text version of password on server which is always not possible. STW protocol was proved to be vulnerable to on-line and o®-line guessing attacks as it lacks server authentication to hosts. LSH 3- PEKE uses server public keys but its not an optimistic solution.the approach of using server public keys is not always a satisfactory solution and is impractical for some environments. Communication parties have to obtain and verify the public key of the server, a task which puts a high burden on the user. SAKA protocol has got limited applications as it is a 2-party protocol. In proposed protocol trusted third party(key Distribution server) mediates in key distribution. Rather than storing clear text version of password one way hash of the password is stored at the server. Every host and server agree upon family of commutative hash functions using which host authenticates itself to server when it applies for session key. During this protocol run host establishes one time key with server using which server also authenticates to host. This defeats man-in-the middle attacks.Di±e-Hellman protocol serves as basis for this protocol. It is secure against dictionary attacks as we use one time keys with server. It is also secure against malaicious insider attacks (host misuses the information in one protocol run to another)since we use one time keys. It also provides perfect forward secrecy i.e. even if one key is disclosed future session keys will not be disclosed. Moreover we don't use any public key infrastructure which needs large computational power. In this protocol server acts just like a authentication server not like a monitoring server. This protocol is also immune to o®-line and on-line guessing attacks as there is no veri¯able information is present.
机译:为了限制泄露的数据量,必须频繁更改密钥。没有有效的密钥分配机制,密码术根本无法取得成功。基于密码机制提出了几种密钥协商协议。这些协议容易受到字典攻击。传统的三方密钥协议协议容易受到内部攻击,服务器成为我们在大多数应用程序中都不希望使用的监视中心。EKE协议容易受到Denning-Sacco攻击。 EKE要求始终无法在服务器上存储密码的明文版本。事实证明,STW协议缺乏对主机的服务器身份验证,因此容易受到在线和o®在线猜测攻击。 LSH 3-PEKE使用服务器公钥,但不是一个乐观的解决方案。使用服务器公钥的方法并不总是令人满意的解决方案,在某些环境中不切实际。通信方必须获取并验证服务器的公共密钥,这是给用户带来沉重负担的任务。 SAKA协议是一种两方协议,因此其应用受到限制。在提出的协议中,受信任的第三方(密钥分发服务器)在密钥分发中进行中介。而不是存储密码的明文版本,而是将密码的哈希值存储在服务器上的一种方式。每个主机和服务器都同意使用交换哈希函数系列,当主机申请会话密钥时,使用该主机向服务器进行身份验证。在此协议运行期间,主机与服务器建立一个时间密钥,服务器也使用该时间密钥对主机进行身份验证。这击败了中间人攻击。Di±e-Hellman协议是该协议的基础。由于我们在服务器上使用了一次密钥,因此可以防止字典攻击。由于我们使用了一个时间密钥,因此它也可以抵御恶意的内部攻击(主机将一种协议中的信息滥用到另一种协议中)。它还提供了完美的前向保密性,即,即使公开了一个密钥,以后的会话密钥也不会公开。而且,我们不使用任何需要大量计算能力的公钥基础结构。在此协议中,服务器的行为就像身份验证服务器,而不是监视服务器。由于没有可验证的信息,因此该协议也不受在线和在线猜测攻击的影响。

著录项

  • 作者

    Kulkarni Sairam;

  • 作者单位
  • 年度 2007
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号