An Optimal Three Parties Verifier-Based Key Agreement Protocol

碩士 === 國立勤益科技大學 === 資訊工程系 === 98 === Three–party key exchange protocols communications major application environment is that any two clients, they can verify the ability to use a server to establish communication between the two sides belong to the security of their communications channels, the past...

Full description

Bibliographic Details
Main Authors: Shen-Heng Huang, 黃信衡
Other Authors: Tsung-Hung Lin
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/89958796649721123365
id ndltd-TW-098NCIT5392001
record_format oai_dc
spelling ndltd-TW-098NCIT53920012016-04-04T04:16:51Z http://ndltd.ncl.edu.tw/handle/89958796649721123365 An Optimal Three Parties Verifier-Based Key Agreement Protocol 一個最佳驗證機制的三方通訊金鑰交換協定 Shen-Heng Huang 黃信衡 碩士 國立勤益科技大學 資訊工程系 98 Three–party key exchange protocols communications major application environment is that any two clients, they can verify the ability to use a server to establish communication between the two sides belong to the security of their communications channels, the past practice is to use the KDC to help users both a user certificate and the distribution of key communications sharing, and the last few years, Server public keys must be well-protected at all times, to ensure that both parties involved in a transaction are able to continue accepting and authenticating messages sent by the server. Accidentally losing or leaking a private key usually results in significant security issues. Recently, researchers have begun proposing new exchange protocols that would not require the use of server public keys. The main purpose of these studies has been to resolve the previously mentioned security issues, and thereby enhance the security of communication exchanges through these new protocols. Such measures could help to prevent serious losses caused by server attacks or code cracking. A trusted third party would assist in the key exchange procedure. In the exchange process, the server would verify the identities and access codes of both parties, and assign them each common communication keys. Most of these protocols require to using server public key to prevent on-line password guessing attack and off-line password guessing attack, However, the approach of using server public is not always a satisfactory solution and is impractical for some environments. The paper propose a new and efficient key agreement protocol for forward secrecy. Tsung-Hung Lin 林宗宏 2010 學位論文 ; thesis 57 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立勤益科技大學 === 資訊工程系 === 98 === Three–party key exchange protocols communications major application environment is that any two clients, they can verify the ability to use a server to establish communication between the two sides belong to the security of their communications channels, the past practice is to use the KDC to help users both a user certificate and the distribution of key communications sharing, and the last few years, Server public keys must be well-protected at all times, to ensure that both parties involved in a transaction are able to continue accepting and authenticating messages sent by the server. Accidentally losing or leaking a private key usually results in significant security issues. Recently, researchers have begun proposing new exchange protocols that would not require the use of server public keys. The main purpose of these studies has been to resolve the previously mentioned security issues, and thereby enhance the security of communication exchanges through these new protocols. Such measures could help to prevent serious losses caused by server attacks or code cracking. A trusted third party would assist in the key exchange procedure. In the exchange process, the server would verify the identities and access codes of both parties, and assign them each common communication keys. Most of these protocols require to using server public key to prevent on-line password guessing attack and off-line password guessing attack, However, the approach of using server public is not always a satisfactory solution and is impractical for some environments. The paper propose a new and efficient key agreement protocol for forward secrecy.
author2 Tsung-Hung Lin
author_facet Tsung-Hung Lin
Shen-Heng Huang
黃信衡
author Shen-Heng Huang
黃信衡
spellingShingle Shen-Heng Huang
黃信衡
An Optimal Three Parties Verifier-Based Key Agreement Protocol
author_sort Shen-Heng Huang
title An Optimal Three Parties Verifier-Based Key Agreement Protocol
title_short An Optimal Three Parties Verifier-Based Key Agreement Protocol
title_full An Optimal Three Parties Verifier-Based Key Agreement Protocol
title_fullStr An Optimal Three Parties Verifier-Based Key Agreement Protocol
title_full_unstemmed An Optimal Three Parties Verifier-Based Key Agreement Protocol
title_sort optimal three parties verifier-based key agreement protocol
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/89958796649721123365
work_keys_str_mv AT shenhenghuang anoptimalthreepartiesverifierbasedkeyagreementprotocol
AT huángxìnhéng anoptimalthreepartiesverifierbasedkeyagreementprotocol
AT shenhenghuang yīgèzuìjiāyànzhèngjīzhìdesānfāngtōngxùnjīnyàojiāohuànxiédìng
AT huángxìnhéng yīgèzuìjiāyànzhèngjīzhìdesānfāngtōngxùnjīnyàojiāohuànxiédìng
AT shenhenghuang optimalthreepartiesverifierbasedkeyagreementprotocol
AT huángxìnhéng optimalthreepartiesverifierbasedkeyagreementprotocol
_version_ 1718214047900368896