Designing a Client-to-client Password-Authenticated Key Exchange Protocol

碩士 === 淡江大學 === 電機工程學系碩士班 === 99 === Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange), We list attacker may launch various attacks, W...

Full description

Bibliographic Details
Main Authors: Yi-Ping Liao, 廖宜平
Other Authors: 裝博任
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/71610192614127640803
id ndltd-TW-099TKU05442005
record_format oai_dc
spelling ndltd-TW-099TKU054420052015-10-30T04:05:41Z http://ndltd.ncl.edu.tw/handle/71610192614127640803 Designing a Client-to-client Password-Authenticated Key Exchange Protocol 點對點密碼認證金鑰協商協定之設計 Yi-Ping Liao 廖宜平 碩士 淡江大學 電機工程學系碩士班 99 Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange), We list attacker may launch various attacks, We also analysis of nearly years C2C protocol''s advantages, disadvantages and their vulnerability, then we strengthen protocol''s security. The proposed protocol mainly based Smart Card Framework Agreement to be improved, Smart Card protocol, Smart Card allows users to exchange information first, then use the mod calculation features to achieve the purpose of verification, use the calculation features of mod that allows transmission The information includes a random number, can resist the off-line dictionary attacks. We add Ding, who propose the protocol in 2009 use the a password on the authentication exchange Diffie-Hellman parameter approach, and then add the Diffie-Hellman and server''s private key to authentication package, so you can reach the outcome of password, Smart Card information and server''s private key constituents mutual protection. This paper use the Kazuki''s improving security module to verify the security of protocol, the improving security module can verify that the KCI, LEP attack current security module can not verify, we use this module to prove protocol can resist the BR, KCI, LEP attack. This paper also compared the cost of the protocols to demonstrate our protocol increases the scope of reasonable cost. 裝博任 2011 學位論文 ; thesis 81 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 淡江大學 === 電機工程學系碩士班 === 99 === Before conducting secure communications, users must establish a higher security key for communication from memory low security Password security, this process is known as PAKE (Password-Authenticated Key Exchange), We list attacker may launch various attacks, We also analysis of nearly years C2C protocol''s advantages, disadvantages and their vulnerability, then we strengthen protocol''s security. The proposed protocol mainly based Smart Card Framework Agreement to be improved, Smart Card protocol, Smart Card allows users to exchange information first, then use the mod calculation features to achieve the purpose of verification, use the calculation features of mod that allows transmission The information includes a random number, can resist the off-line dictionary attacks. We add Ding, who propose the protocol in 2009 use the a password on the authentication exchange Diffie-Hellman parameter approach, and then add the Diffie-Hellman and server''s private key to authentication package, so you can reach the outcome of password, Smart Card information and server''s private key constituents mutual protection. This paper use the Kazuki''s improving security module to verify the security of protocol, the improving security module can verify that the KCI, LEP attack current security module can not verify, we use this module to prove protocol can resist the BR, KCI, LEP attack. This paper also compared the cost of the protocols to demonstrate our protocol increases the scope of reasonable cost.
author2 裝博任
author_facet 裝博任
Yi-Ping Liao
廖宜平
author Yi-Ping Liao
廖宜平
spellingShingle Yi-Ping Liao
廖宜平
Designing a Client-to-client Password-Authenticated Key Exchange Protocol
author_sort Yi-Ping Liao
title Designing a Client-to-client Password-Authenticated Key Exchange Protocol
title_short Designing a Client-to-client Password-Authenticated Key Exchange Protocol
title_full Designing a Client-to-client Password-Authenticated Key Exchange Protocol
title_fullStr Designing a Client-to-client Password-Authenticated Key Exchange Protocol
title_full_unstemmed Designing a Client-to-client Password-Authenticated Key Exchange Protocol
title_sort designing a client-to-client password-authenticated key exchange protocol
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/71610192614127640803
work_keys_str_mv AT yipingliao designingaclienttoclientpasswordauthenticatedkeyexchangeprotocol
AT liàoyípíng designingaclienttoclientpasswordauthenticatedkeyexchangeprotocol
AT yipingliao diǎnduìdiǎnmìmǎrènzhèngjīnyàoxiéshāngxiédìngzhīshèjì
AT liàoyípíng diǎnduìdiǎnmìmǎrènzhèngjīnyàoxiéshāngxiédìngzhīshèjì
_version_ 1718116799125389312