Secure Key Agreement and User Authentication Protocols for Off-Line Virtual Private Network Applications

碩士 === 朝陽大學 === 資訊管理系碩士班 === 88 === Virtual private network, or VPN in short, is to provide a private network through a public internet infrastructure without the need of wasting much money to establish a dedicated network. VPN is a high level concept; it employs four techniques including tunneling...

Full description

Bibliographic Details
Main Authors: Bin-Tsan Hsieh, 謝濱燦
Other Authors: Hung-Min Sun
Format: Others
Language:en_US
Published: 2000
Online Access:http://ndltd.ncl.edu.tw/handle/50363702022196701074
Description
Summary:碩士 === 朝陽大學 === 資訊管理系碩士班 === 88 === Virtual private network, or VPN in short, is to provide a private network through a public internet infrastructure without the need of wasting much money to establish a dedicated network. VPN is a high level concept; it employs four techniques including tunneling, encryption/decryption, key management, and authentication. To solve the key agreement and user authentication problem in VPN, we review several key agreement and user authentication protocols for different environments, and study on many security requirements for key agreement and user authentication protocols, such as password-guessing attack, forward secrecy, known-key security, denning-sacco attack, and replay attack. Based on these protocols, we propose some secure key agreement and user authentication protocols for off-line VPN applications that can satisfy all the necessary security requirements. We believe that our proposed protocols must have the most significant meaning to VPN and will bring its security and convenience to a higher level.