Designing a Client-to-client Password-Authenticated Key Exchange Protocol
碩士 === 淡江大學 === 電機工程學系碩士班 === 99 === Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange), We list attacker may launch various attacks, W...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/71610192614127640803 |
id |
ndltd-TW-099TKU05442005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099TKU054420052015-10-30T04:05:41Z http://ndltd.ncl.edu.tw/handle/71610192614127640803 Designing a Client-to-client Password-Authenticated Key Exchange Protocol 點對點密碼認證金鑰協商協定之設計 Yi-Ping Liao 廖宜平 碩士 淡江大學 電機工程學系碩士班 99 Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange), We list attacker may launch various attacks, We also analysis of nearly years C2C protocol''s advantages, disadvantages and their vulnerability, then we strengthen protocol''s security. The proposed protocol mainly based Smart Card Framework Agreement to be improved, Smart Card protocol, Smart Card allows users to exchange information first, then use the mod calculation features to achieve the purpose of verification, use the calculation features of mod that allows transmission The information includes a random number, can resist the off-line dictionary attacks. We add Ding, who propose the protocol in 2009 use the a password on the authentication exchange Diffie-Hellman parameter approach, and then add the Diffie-Hellman and server''s private key to authentication package, so you can reach the outcome of password, Smart Card information and server''s private key constituents mutual protection. This paper use the Kazuki''s improving security module to verify the security of protocol, the improving security module can verify that the KCI, LEP attack current security module can not verify, we use this module to prove protocol can resist the BR, KCI, LEP attack. This paper also compared the cost of the protocols to demonstrate our protocol increases the scope of reasonable cost. 裝博任 2011 學位論文 ; thesis 81 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 淡江大學 === 電機工程學系碩士班 === 99 === Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange),
We list attacker may launch various attacks, We also analysis of nearly years C2C protocol''s advantages, disadvantages and their vulnerability, then we strengthen protocol''s security. The proposed protocol mainly based Smart Card Framework Agreement to be improved, Smart Card protocol, Smart Card allows users to exchange information first, then use the mod calculation features to achieve the purpose of verification, use the calculation features of mod that allows transmission The information includes a random number, can resist the off-line dictionary attacks. We add Ding, who propose the protocol in 2009 use the a password on the authentication exchange Diffie-Hellman parameter approach, and then add the Diffie-Hellman and server''s private key to authentication package, so you can reach the outcome of password, Smart Card information and server''s private key constituents mutual protection.
This paper use the Kazuki''s improving security module to verify the security of protocol, the improving security module can verify that the KCI, LEP attack current security module can not verify, we use this module to prove protocol can resist the BR, KCI, LEP attack.
This paper also compared the cost of the protocols to demonstrate our protocol increases the scope of reasonable cost.
|
author2 |
裝博任 |
author_facet |
裝博任 Yi-Ping Liao 廖宜平 |
author |
Yi-Ping Liao 廖宜平 |
spellingShingle |
Yi-Ping Liao 廖宜平 Designing a Client-to-client Password-Authenticated Key Exchange Protocol |
author_sort |
Yi-Ping Liao |
title |
Designing a Client-to-client Password-Authenticated Key Exchange Protocol |
title_short |
Designing a Client-to-client Password-Authenticated Key Exchange Protocol |
title_full |
Designing a Client-to-client Password-Authenticated Key Exchange Protocol |
title_fullStr |
Designing a Client-to-client Password-Authenticated Key Exchange Protocol |
title_full_unstemmed |
Designing a Client-to-client Password-Authenticated Key Exchange Protocol |
title_sort |
designing a client-to-client password-authenticated key exchange protocol |
publishDate |
2011 |
url |
http://ndltd.ncl.edu.tw/handle/71610192614127640803 |
work_keys_str_mv |
AT yipingliao designingaclienttoclientpasswordauthenticatedkeyexchangeprotocol AT liàoyípíng designingaclienttoclientpasswordauthenticatedkeyexchangeprotocol AT yipingliao diǎnduìdiǎnmìmǎrènzhèngjīnyàoxiéshāngxiédìngzhīshèjì AT liàoyípíng diǎnduìdiǎnmìmǎrènzhèngjīnyàoxiéshāngxiédìngzhīshèjì |
_version_ |
1718116799125389312 |