期刊文献+

多态性密钥交换协议的位独立性安全分析 被引量:3

Research on BIC Security Mechanisms of the Polymorphic Key Exchange Protocol
下载PDF
导出
摘要 Diffie-Hellman协议是用于正规场景中的基于离散对数的密钥交换算法,该算法要求通信双方建立长期可信任的伙伴关系。基于多态性Diffie-Hellman密钥交换协议,提出更加安全的多态性密钥交换协议设计方案,在交换协议中附加了通信双方的身份信息,可以由通信双方各自的伪随机序列产生器来共同设计多态性S-盒,这种多态性S-盒在非正规的场景中可以得到广泛应用。 Diffie-Hellman key exchange algorithm, which is used in regular scenes based on the discrete logarithm problem, demands that both of two communication parties struck up a lively conversation long-term dependable fellowship. A much more secure polymorphic key exchange algorithm was proposed based on the Diffie-Hellman key exchange algo- rithra. The identity information of two parties can be appended to the agreement. Both communication parties use their PRNGs to finish the polymorphic virtual S-box together. The polymorphic S-box can become a broad agreement in irregular scenes.
出处 《计算机科学》 CSCD 北大核心 2012年第3期51-53,共3页 Computer Science
基金 国家重点基础研究发展计划(973计划)课题(2009CB320404) 郑州轻工业学院博士基金(2010BSJJ005)资助
关键词 多态性密码 多态性虚拟S-盒 多态性密钥交换协议 位独立性准则 Polymorphic cipher, Polymorphic virtual S-box, Polymorphic key exchange algorithm, Bit independence criterion
  • 相关文献

参考文献2

二级参考文献24

  • 1饶妮妮.一种基于重组DNA技术的密码方案[J].电子学报,2004,32(7):1216-1218. 被引量:10
  • 2张玉安,冯登国.一种实用的仿一次一密分组加密方案[J].北京邮电大学学报,2005,28(2):101-104. 被引量:16
  • 3NEUMANN J. Various techniques used in connection with random digits[J]. National Bureau of Standards Applied Mathematics, 1951, (12): 36-38.
  • 4KNUYH D E. The Art of Computer Programming, Volume 2: Seminumerical Algorithms[M]. 3rd Ed, New Jersey : Addison- Wesley, 1981.59-73,
  • 5RUKHIN A, SOTO J, NECHVATAL J, et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications[R]. Technical Report, SP 800-22, 2001.
  • 6FILIOL E. A new statistical testing for symmetric ciphers and hash functions[A]. Information and Communications Security: 4th International Conference[C]. Berlin : Springer, 2002. 342-353.
  • 7TSANG W W, HUI L C K, CHOW K E Tuning the collision test for power[A]. Proceedings of the 27th Australasian conference on Computer Science - Volume 26 Dunedin[C]. New Zealand: Australian Computer Society, 2004.23-30.
  • 8HAMANO K, KANEKO T. Correction of overlapping template matching test included in nist randomness test suite[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007,90(19): 1788-1792.
  • 9PARESCHI E ROVATTI R, SETTI G Second-level NIST randomness tests for improving test reliability[A]. International Symposium on Circuits and Systems (ISCAS 2007)[C]. New Orleans, Louisiana, USA, 2007.1437-1440.
  • 10Information Security Institute. CryptX statistical software package[EB/OL], http://www.isi.qut.edu.cu/resources/cryptx,1998

共引文献9

同被引文献23

  • 1朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 2赵永哲,姜占华,黄声烈.基于F_2上遍历矩阵的Shamir三次传递协议的实现[J].小型微型计算机系统,2006,27(6):986-991. 被引量:11
  • 3Diffie W, Hellman M E. New Directions in Cryptography [ J]. IEEE Transactions on Information Theory, 1976,22 (6) :644 - 654.
  • 4Laurie Law, Alfred Menczes, Minghua Qu, et al. An Efficient Protocol for Authenticated Key Agreement [ J ]. Journal of Physics: Condensed Matter,2003,28 (2) : 119 - 134.
  • 5Bellovin S M, Merritt M. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks [ C ]//Proceedings of the 1992 IEEE Computer Society Conference on Research in Security and Privacy, 1992:72 - 84.
  • 6E1Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms [ J ]. IEEE Transactions on Information Theory, 1985,31 (4) :469 -472.
  • 7Rivest R, Shamir A, Adleman L. A method for obtaining digital signa- tures and public-key cryptosystems [ J ]. Communications of the ACM, 1978,21 (2) : 120 - 126.
  • 8Wu C, Dawaon E. Generalized inverses in public key cryptosystem de- sign[ J]. IEEE Proceedings-Computers and Digital Techniques, 1998, 145(5) :321 -326.
  • 9Rafael alvarez, Leandro Tortosa, Jose - Fco Vicent, et al. Analysis and design of a secure key exchange scheme [ J ]. Information Sciences, 2009(179) :2014 -2021.
  • 10Abdel Alim Kamal, Amr M Youssef. Crytanalysis of 6.1varez et al. key exchange scheme [ J ]. Information Sciences,2013 (223) :317 - 321.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部