网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (6): 13-21.doi: 10.11959/j.issn.2096-109x.2016.00060

• 学术论文 • 上一篇    下一篇

有效的基于混沌映射的三方认证密钥协商协议

李雄1(),吴凡2,廖俊国1,刘玉珍1   

  1. 1 湖南科技大学计算机科学与工程学院,湖南 湘潭411201
    2 厦门工学院计算机科学与工程系,福建 厦门361021
  • 修回日期:2016-06-03 出版日期:2016-06-15 发布日期:2020-03-26
  • 作者简介:李雄(1984-),男,土家族,湖南张家界人,博士,湖南科技大学副教授、硕士生导师,主要研究方向为信息安全和密码学。|吴凡(1981-),男,山东济宁人,厦门理工学院讲师,主要研究方向为信息安全和网络协议。|廖俊国(1972-),男,湖南衡阳人,博士,湖南科技大学教授、硕士生导师,主要研究方向为网络与信息安全。|刘玉珍(1979-),男,山东单县人,博士,湖南科技大学讲师,主要研究方向为密码学、智能计算。
  • 基金资助:
    国家自然科学基金资助项目(61300220);湖南省教育厅一般基金资助项目(15C0545);福建省高校杰出青年科研人才培育基金资助项目;福建省中青年教师教育科研基金资助项目(JA14369)

Efficient three-party authenticated key agreement protocol based on chaotic map

Xiong LI1(),Fan WU2,Jun-guo LIAO1,Yu-zhen LIU1   

  1. 1 School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 411201,China
    2 Department of Computer Science and Engineering,Xiamen Institute of Technology,Xiamen 361021,China
  • Revised:2016-06-03 Online:2016-06-15 Published:2020-03-26
  • Supported by:
    The National Natural Science Foundation of China(61300220);Scientific Research Foundation of Hu-nan Provincial Education Department(15C0545);University Distinguished Young Research Talent Training Program of Fujian Province;The Education Scientific Research Project for Young Teachers of Fujian(JA14369)

摘要:

由于良好的密码特性,混沌映射被用于设计密钥协商协议。在多数基于混沌映射的口令三方密钥协商协议中,服务器需存储用户口令表,使这些协议容易遭受口令相关的攻击,且一旦口令表泄露,将带来巨大的安全隐患。针对这些安全问题,提出了一个新的基于混沌映射口令三方认证密钥协商协议,服务器无需维护用户口令表,避免了口令相关的攻击。同其他相关协议相比,所提协议在增强安全性的同时,大大提高了协议的执行效率。

关键词: 混沌映射, 密钥协商, 认证, 口令

Abstract:

Chaotic map has been used in the design of key agreement protocol due to its excellent properties.In most of password three-party authenticated key agreement protocol based on chaotic map,the server needs to store a sensitive password table.It makes these protocols vulnerable to some password related attacks.Besides,it would be dangerous if the password table was leaked.To resolve the aforementioned problems,a new password three-party authenticated key agreement protocol based on chaotic maps was proposed.The server didn't need to maintain a password table,so the proposed scheme was free from password related attack.Compared with other related proto-cols,the proposed protocol not only enhances the security,but also improves the efficiency greatly.

Key words: chaotic maps, key agreement, authentication, password

中图分类号: 

No Suggested Reading articles found!