[1]李华峰,钱焕延.一种用于口令同步的通用混合密码传输协议[J].南京师范大学学报(工程技术版),2008,08(04):178-181.
 L iHuafeng,Q ianH uanyan.A GeneralHybrid Cryptograph Transfer ProtocolApplied in Password Synchronization[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):178-181.
点击复制

一种用于口令同步的通用混合密码传输协议
分享到:

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
08卷
期数:
2008年04期
页码:
178-181
栏目:
出版日期:
2008-12-30

文章信息/Info

Title:
A GeneralHybrid Cryptograph Transfer ProtocolApplied in Password Synchronization
作者:
 李华峰 钱焕延
 南京理工大学网络中心, 江苏南京210094
Author(s):
 L iHuafeng Q ianH uanyan
Netw ork C enter, Nan jing Un ivers ity of S cien ce and Technology, Nan jing 210094, Ch in a
关键词:
 网络安全 认证协议 口令同步 混合密码传输协议
Keywords:
network secur ity authentication protocol passwo rd synchron ization H CTP
分类号:
TP393.12
文献标志码:
A
摘要:
结合基于对称密钥的认证协议和基于公开密钥的认证协议, 提出了一种用于口令同步的通用混合密码传输协议, 给出了具体的需求分析、算法选择和协议内容, 并在协议分析的基础上用BAN 逻辑证明了它的有效性. 分析结果证明, 该协议能够达到预期目标.
Abstract:
This paper com bines the authentication pro tocol based on symm e tric keyw ith the au thentication protoco l based on pub lic key, prov ides a genera l hybr id cryptog raph transfer pro toco l( HCTP) app lied in passw ord synchron ization. It a lso reveals requirem ents ana ly sis, a lgo rithm se lection, pro toco l conten t, and proves its v alid ity through BAN log ic on the basis of protoco l analysis. The ana ly sis result prov es that the purpose o f pro to co l can be ach ieved as expected

参考文献/References:

 [ 1] M enezes A, van Oorscho t P, Vanstone S. H andbook o f Applied Cryptog raphy[M ] . USA: CRC Press Inc, 1997.
[ 2] B lake-W ilson S, M eneses A. Unknown key- sha re a ttacks on the station-to- sta tion ( STS) protoco l[ D]. Canada: Univers ity o f W a terloo, 1998.
[ 3] 韦卫, 王德杰, 张英, 等. 基于SSL的安全WWW 系统的研究与实现[ J]. 计算机研究与发展, 1999, 36( 5): 619-624.
W eW e ,i W ang De jie, Zhang Y ing, e t a.l Study and imp lem enta tion o f a securew orld w idew eb system based on secure so ckets layer[ J] . Journa l of Computer Research and Dev elopment, 1999, 36( 5): 619-624. ( in Chinese)
[ 4] BurrowM, Abad iM, Needham R. A log ic of authen tication[ J]. ACM Transactions on Com pute r System s, 1990, 8( 1): 18-36

相似文献/References:

[1]黄赛平,许明.验证码的识别与改进[J].南京师范大学学报(工程技术版),2009,09(02):084.
 Huang Saiping,Xu Ming.Recognition and Improvement of Identifying Code[J].Journal of Nanjing Normal University(Engineering and Technology),2009,09(04):084.
[2]商炳章,白清源.基于互信息规则剪枝的关联文本分类[J].南京师范大学学报(工程技术版),2008,08(04):173.
 Shang B ingzhang,B aiQ ingyuan.On Classif ication of Associative Text Based on Rules Pruning ofMutual Information[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):173.
[3]李 慧,李存华,王 霞.一种新颖的个性化视频搜索排名算法[J].南京师范大学学报(工程技术版),2008,08(04):182.
 L iH u,i L iCunhua,W ang X ia.A Novel Individualized V ideo Search Rank ing Algorithm[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):182.
[4]强 浩,施连敏,王洪元.基于CDMA 6025平台的Flash文件系统的设计[J].南京师范大学学报(工程技术版),2008,08(04):186.
 Q iang H ao,Sh iL ianm in,W angH ongyuan. Design of Flash File System Based on 6025 P latform of CDMA[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):186.
[5]冯茂岩.立体显示与三维液晶技术研究[J].南京师范大学学报(工程技术版),2008,08(04):195.
 FengM aoyan.Research of the Stereoscopic D isplay and 3D LCD Technique[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):195.

备注/Memo

备注/Memo:
 通讯联系人: 李华峰, 博士研究生, 研究方向: 网络安全及网络应用技术. E-m ail:lh feng@ m ail.n just. edu. cn
更新日期/Last Update: 2013-07-22