Dissertation > Excellent graduate degree dissertation topics show

Research on Identity Based Authentication and Key Agreement Protocol

Author: ShiYaBin
Tutor: HuangKaiZhi
School: PLA Information Engineering University
Course: Communication and Information System
Keywords: Authentication and key agreement Identity-based Heterogeneous converged networks Provably secure Formal Analysis Bilinear pairings
CLC: TN918.2
Type: Master's thesis
Year: 2009
Downloads: 85
Quote: 0
Read: Download Dissertation


With the development and popularization of various wireless networks, the seamless integration of heterogeneous wireless network is the inevitable trend of future network development, so as to provide people with the ability to access the network anytime, anywhere. Openness and its integration of a variety of wireless network itself greatly increase the potential threat of network and information security, the need for sound authentication and key agreement protocol to provide reliable protection for network security. Both the existing authentication and key agreement protocol belong to the same private key generator (PKG, Private Key Generator), and using the same primary key, heterogeneous converged network environment, cross-network roaming user computing and security requirements are not met ; tripartite agreement does not meet the characteristics of the asymmetry of the mobile terminal and server computing power and computing resources, there are some flaws or security, for example, does not provide adequate security attributes, not formal security proof. Integration for heterogeneous network identity-based authentication and key agreement protocol launched an in-depth study, and its formal safety proof. Specific work as follows: 1. Formal analysis method based on the authentication and key agreement protocol, provable security Eck model be extended. According to the characteristics of identity-based authentication and key agreement protocol for third-party authority trusted PKG, extends the model of the attacker the ability to ensure that the agreement with PKG forward secrecy. 2 for the mobile terminal when the type of inter-network roaming session both parties belong to the type of PKG proposed a suitable both belong to the type of the PKG authentication and key agreement protocol. The protocol is based on the bilinear nature and BDH (Bilinear Diffie-Hellman), CDH (Computational Diffie-Hellman) security assumptions, comprehensive utilization of peers temporary key, the public key of a public key and PKG, consultation session key shared . Based above eCK security model program security proof, the security analysis shows that the scheme to meet the known key security, anti-key compromise attacks, perfect forward secrecy, PKG forward secrecy and other security requirements. Terminal integration for heterogeneous wireless network environment and server computing power on both sides of the asymmetric characteristics of a heterogeneous integration tripartite identity-based authentication and key agreement protocol in a network environment. The agreement to meet the security needs of the integration of heterogeneous wireless network environment and resource overhead and more calculated by the server-side; also according to the confidentiality requirements of the legitimate needs and personal communications by both temporary key information, key escrow and the key is not hosted two functions. Based on the BAN logic formal analysis of the agreement, security analysis and performance comparison shows that the session key agreement protocol can more safely and efficiently.

Related Dissertations

  1. Research of the Identity-based Encryption and Signature,TN918.1
  2. Research and Design of Secure Comunication of NVD on Demand System,TP309
  3. Mobile terminal identity digital signature scheme based on research,TN918.1
  4. Identity passwords on key management,TN918.2
  5. Identity-Based Authentication System Research and Implementation,TN918.1
  6. Pervasive Computing Research dynamically update its formal,TP338
  7. Formal Model Depiction and Algebraic Property Study for Security Protocol,TP274
  8. Design and Parse of Formal Specification Language for Security Protocols,TP393.08
  9. Key Issues of Formal Analysis for Seciruty Protocols,TP393.08
  10. Design and Implementation Automatic Analyzer for Security Protocol,TP393.08
  11. Studies on RFID Security Authentication Protocol,TP391.44
  12. Research on Automatic Security Proof Approach of Public-key Cryptographic Schemes Based on Process Calculus,TN918.1
  13. Design and Implementation of Description Model for Provable Security Automatic Analyse of Public-key Cryptographic Schemes,TN918.2
  14. Design and Analysis of Certificateless Signature and Signcryption Schemes,TN918.1
  15. Provably Secure Password Authenticated Key Exchange Protocols Based on RSA,TN918.1
  16. A continued fraction linear lower bound of research and types of proxy signature scheme design,TN918.1
  17. Continued fraction linear lower bound on the number of identity-based signature,TN918.1
  18. Research on Special Digital Signature Scheme Based on the Bilinear Pairing,TN918.1
  19. Design and Implementation Research of Cryptographic Security System of USB Interface,TN918.4
  20. Study on Batch Verification of Digital Signatures,TN918.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Password, machine
© 2012 www.DissertationTopic.Net  Mobile