Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme
碩士 === 國立交通大學 === 資訊科學系 === 90 === Alice and Bob have shared a password (short, insecure), they want to authenticate each other and generate a session key(long, secure) by this password; then using this session key to encrypt messages between them and avoiding the data or information been intercepte...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2002
|
Online Access: | http://ndltd.ncl.edu.tw/handle/34146784221240024895 |
id |
ndltd-TW-090NCTU0394078 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-090NCTU03940782016-06-27T16:09:00Z http://ndltd.ncl.edu.tw/handle/34146784221240024895 Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme 使用ElGamal加密機制的通行碼驗證與金鑰交換協定 陳嘉宏 碩士 國立交通大學 資訊科學系 90 Alice and Bob have shared a password (short, insecure), they want to authenticate each other and generate a session key(long, secure) by this password; then using this session key to encrypt messages between them and avoiding the data or information been intercepted by attacker on the insecure internet transmission and cause the intruders get the substance. This problem is called "Password-authenticated key exchange problem". Due to the length of their share password must be easy to remember for people, it means password can be attacked by some special facility approach. For example, Eavesdropping attack、Replay attack、Dictionary attack…etc. and then cause it lose the valuable password. Therefore, in this paper, we propose a password-authenticated key exchange protocol that can be able to resist those attack, and moreover providing a complete and security proof of the protocol that we proposed. 曾文貴 2002 學位論文 ; thesis 50 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊科學系 === 90 === Alice and Bob have shared a password (short, insecure), they want to authenticate each other and generate a session key(long, secure) by this password; then using this session key to encrypt messages between them and avoiding the data or information been intercepted by attacker on the insecure internet transmission and cause the intruders get the substance. This problem is called "Password-authenticated key exchange problem".
Due to the length of their share password must be easy to remember for people, it means password can be attacked by some special facility approach. For example, Eavesdropping attack、Replay attack、Dictionary attack…etc. and then cause it lose the valuable password.
Therefore, in this paper, we propose a password-authenticated key exchange protocol that can be able to resist those attack, and moreover providing a complete and security proof of the protocol that we proposed.
|
author2 |
曾文貴 |
author_facet |
曾文貴 陳嘉宏 |
author |
陳嘉宏 |
spellingShingle |
陳嘉宏 Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme |
author_sort |
陳嘉宏 |
title |
Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme |
title_short |
Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme |
title_full |
Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme |
title_fullStr |
Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme |
title_full_unstemmed |
Password-Authenticated Key Exchange protocol using ElGamal Encryption Scheme |
title_sort |
password-authenticated key exchange protocol using elgamal encryption scheme |
publishDate |
2002 |
url |
http://ndltd.ncl.edu.tw/handle/34146784221240024895 |
work_keys_str_mv |
AT chénjiāhóng passwordauthenticatedkeyexchangeprotocolusingelgamalencryptionscheme AT chénjiāhóng shǐyòngelgamaljiāmìjīzhìdetōngxíngmǎyànzhèngyǔjīnyàojiāohuànxiédìng |
_version_ |
1718324554413113344 |