1 / 130
文档名称:

三方认证密钥交换协议的研究.pdf

格式:pdf   页数:130页
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

三方认证密钥交换协议的研究.pdf

上传人:799474576 2016/1/16 文件大小:0 KB

下载得到文件列表

三方认证密钥交换协议的研究.pdf

相关文档

文档介绍

文档介绍:The study on authenticated tripartite key exchange protocolThesis Submitted toShanghai Jiao Tong Universityin partial ful?llment of the requirementfor the degree ofMasterbyWANG Yuanyuan( Computer Science )Thesis Supervisor: CAO ZhenfuDec, 2009??????????????1976??Dif?e-Hellman?DH???????????????????????????????????????????????т????????????????DH?????????????????????????????????????AKE??????????????????????????????????ν??????????ν???????????????????????????????б?????????????????????????????????Ч???????????????????????????ν????????????????????ν??????????Ф?????ν??????????????????????????ν????????Ч??????????1.???????eCK????????????????eCKν?????????б??????????????????KCI?????????????2.???????????????????????????????????????????????????????????????????????????????????????????????eCKν????????????????3.???????????????????σ?????????Ч?ν?????ν???????????б???????????????????????????ν???4.????????????KCI????????????????????????????????????????KCI???????Dif?e-Hellman???????????????ν????eCK??????????????IThe study on authenticated tripartite key exchange protocolABSTRACTIn 1976, Dif?e-Hellman (DH) key exchange protocol was ?rstly proposed to solve theproblem of how two sides without a pre-shared secret negotiate a session key which opensup a new direction for public-key cryptography . However DH protocol can’t resist man-in-middle attack due to lack of authentication. Many researchers have proposed the authen-ticated key exchange (AKE) protocol to resist the man-in-middle attack. In view of thediversity of means of attack from attacker, the formal security model was used to prove thesecurity of the AKE the continuous development of the , there have been many scenarios in-volving a munication, such as merce related to buyers, sellers and trustedthird party, mobile roaming related to the terminal, the local server, remote server. However,the tripartite key exchange protocols lack formal security model, these tripartite protocolsare lack of proof. In view of the importanc