A Study of Security Analysis to Some Authentication Protocols

碩士 === 國立臺中科技大學 === 資訊工程系碩士班 === 102 === Internet technologies change human life. More and more users tend to share or obtain required resources through the Internet. However, the Internet is an open but insecure communication channel. Therefore, how to authenticate the other communication party bec...

Full description

Bibliographic Details
Main Authors: Yuo-Ju Yen, 顏佑如
Other Authors: Ya-Fen Chang
Format: Others
Language:en_US
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/hv7vra
id ndltd-TW-102NTTI5392012
record_format oai_dc
spelling ndltd-TW-102NTTI53920122019-09-24T03:34:12Z http://ndltd.ncl.edu.tw/handle/hv7vra A Study of Security Analysis to Some Authentication Protocols 身分驗證協定的安全性分析之研究 Yuo-Ju Yen 顏佑如 碩士 國立臺中科技大學 資訊工程系碩士班 102 Internet technologies change human life. More and more users tend to share or obtain required resources through the Internet. However, the Internet is an open but insecure communication channel. Therefore, how to authenticate the other communication party becomes an important issue. Public-key cryptography provides a solution to ensure who the communication party is. Conventional public-key cryptosystems need to issue each user a certificate to prove that he/she is indeed the owner of the claimed public key and knows the corresponding private key. However, before a user’s public key is used for encryption or verification, the certificate needs to be verified to prove that the public is valid. This places a heavy burden on users. As a result, identity-based public-key cryptosystems are proposed. In 2012, Xue and Hong proposed an anonymous authentication scheme with key agreement based on chaotic maps. After analyzing Xue and Hong’s scheme thoroughly, we find that their scheme cannot ensure user anonymity as claimed. We will show this found security flaw which Xue and Hong’s scheme from in Chapter 2. Next year, Shim et al. improved two identity-based signature schemes to propose an identity-based broadcast authentication scheme to meet security requirements in wireless sensor networks. However, after analyzing their scheme, it is found that their scheme cannot work at all. Their scheme suffers from one fatal flaw such that no message can be verified successfully to be broadcasted. In this study, the found flaw that Shim et al.’s scheme is also fixed to make sure the modified scheme works well. Ya-Fen Chang 張雅芬 2014 學位論文 ; thesis 19 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺中科技大學 === 資訊工程系碩士班 === 102 === Internet technologies change human life. More and more users tend to share or obtain required resources through the Internet. However, the Internet is an open but insecure communication channel. Therefore, how to authenticate the other communication party becomes an important issue. Public-key cryptography provides a solution to ensure who the communication party is. Conventional public-key cryptosystems need to issue each user a certificate to prove that he/she is indeed the owner of the claimed public key and knows the corresponding private key. However, before a user’s public key is used for encryption or verification, the certificate needs to be verified to prove that the public is valid. This places a heavy burden on users. As a result, identity-based public-key cryptosystems are proposed. In 2012, Xue and Hong proposed an anonymous authentication scheme with key agreement based on chaotic maps. After analyzing Xue and Hong’s scheme thoroughly, we find that their scheme cannot ensure user anonymity as claimed. We will show this found security flaw which Xue and Hong’s scheme from in Chapter 2. Next year, Shim et al. improved two identity-based signature schemes to propose an identity-based broadcast authentication scheme to meet security requirements in wireless sensor networks. However, after analyzing their scheme, it is found that their scheme cannot work at all. Their scheme suffers from one fatal flaw such that no message can be verified successfully to be broadcasted. In this study, the found flaw that Shim et al.’s scheme is also fixed to make sure the modified scheme works well.
author2 Ya-Fen Chang
author_facet Ya-Fen Chang
Yuo-Ju Yen
顏佑如
author Yuo-Ju Yen
顏佑如
spellingShingle Yuo-Ju Yen
顏佑如
A Study of Security Analysis to Some Authentication Protocols
author_sort Yuo-Ju Yen
title A Study of Security Analysis to Some Authentication Protocols
title_short A Study of Security Analysis to Some Authentication Protocols
title_full A Study of Security Analysis to Some Authentication Protocols
title_fullStr A Study of Security Analysis to Some Authentication Protocols
title_full_unstemmed A Study of Security Analysis to Some Authentication Protocols
title_sort study of security analysis to some authentication protocols
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/hv7vra
work_keys_str_mv AT yuojuyen astudyofsecurityanalysistosomeauthenticationprotocols
AT yányòurú astudyofsecurityanalysistosomeauthenticationprotocols
AT yuojuyen shēnfēnyànzhèngxiédìngdeānquánxìngfēnxīzhīyánjiū
AT yányòurú shēnfēnyànzhèngxiédìngdeānquánxìngfēnxīzhīyánjiū
AT yuojuyen studyofsecurityanalysistosomeauthenticationprotocols
AT yányòurú studyofsecurityanalysistosomeauthenticationprotocols
_version_ 1719256351526354944