用于多媒体加密的基于身份的密钥协商协议的安全性
doi: 10.3724/SP.J.1146.2005.01076
Security on ID-Based Key Agreement for Multimedia Encryption
-
摘要: 最近Yi等(2002)提出了一个用于多媒体加密的基于身份的密钥协商协议。协议建立在Diffie-Hellman 密钥交换协议和RSA公钥密码体系之上。Yi等分析了协议的安全性,并认为该协议对于恶意攻击是鲁棒的。然而,本文证明该协议对于某些攻击如伪造秘密信息和篡改交换消息是脆弱的,并分析了该协议受到这些攻击的原因。本文指出由于该协议内在的缺陷,该协议可能难于改善。
-
关键词:
- 安全性;基于身份的密钥协商;恶意攻击
Abstract: Recently, Yi et al..(2002) proposed an ID-based key agreement protocol for multimedia encryption. The protocol was built on both the Diffie-Hellman key exchange protocol and the RSA public key cryptosystem. Yi et al. analyzed the security of the protocol, and understood that the protocol is robust to the malicious attacks. However, this paper shows that the protocol is vulnerable to certain malicious attacks such as forging secret information and tampering exchanging messages and analyzes the reasons that the protocol suffers these attacks. This paper points out that it may be hard to improve the protocol due to the inherent flaw of the protocol. -
[1] Yi X, Tan C H, and Siew C K, et al.. ID-based key agreement for multimedia encryption[J].IEEE Trans. on Consumer Electronics.2002, 48 (2):298-303 [2] Bird R.[J].Gopal I, and Herzberg A, et al.. Systematic design of two-party authentication protocols. Advances in CryptologyCRYPTO91, Santa Barbara.1991,:- [3] Diffie W, Oorschot P, and Wiener M. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 1992 2(2): 107-125. [4] Bellare M and Rogaway P. Provably secure session key distribution. Advances in CryptologyCRYPTO93, Santa Barbara, 1993: 232-249. [5] 毛文波. 现代密码学: 理论与实践. 北京: 电子工业出版社, 2004: 1-477. [6] Wilson S B and Menezes A. Authenticated Diffie-Hellman key agreement protocols. Fifth Annual Workshop on Selected Areas in Cryptography, Ontario, 1998: 339-361. [7] 卿斯汉. 安全协议20年研究进展. 软件学报, 2003, 14 (10): 1740-1752. Qing Si-han. Twenty years development of security protocols research. Journal of Software, 2003, 14 (10): 1740-1752. [8] 卿斯汉. 安全协议的设计与逻辑分析. 软件学报, 2003, 14(7): 1300-1309. Qing Si-han. Design and logical analysis of security protocols. Journal of Software, 2003, 14(7): 1300-1309. [9] 范红, 冯登国. 安全协议理论与方法. 北京: 科学出版社, 2003: 13-46. [10] Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley Sons, Inc. 1996: 246-246.
点击查看大图
计量
- 文章访问数: 3365
- HTML全文浏览量: 85
- PDF下载量: 677
- 被引次数: 0