计算机应用 ›› 2012, Vol. 32 ›› Issue (05): 1381-1384.

• 信息安全 • 上一篇    下一篇

鲁棒且高效的远程认证及密钥协商协议

唐宏斌,刘心松   

  1. 电子科技大学 计算机科学与工程学院,成都 610054
  • 收稿日期:2011-11-07 修回日期:2011-12-15 发布日期:2012-05-01 出版日期:2012-05-01
  • 通讯作者: 唐宏斌
  • 作者简介:唐宏斌(1973-),男,广西河池人,博士研究生,主要研究方向:分布式系统、密码学协议;刘心松(1940-),男,重庆石柱人,教授,博士,主要研究方向:数字有机体系统。

Robust and efficient remote authentication with key agreement protocol

TANG Hong-bin,LIU Xin-song   

  1. School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu Sichuan 610054, China
  • Received:2011-11-07 Revised:2011-12-15 Online:2012-05-01 Published:2012-05-01
  • Contact: TANG Hong-bin

摘要: 由于口令容易记忆,基于口令的认证协议已被广泛采用于各种网络服务中。然而由于口令的低熵性导致了基于口令的认证协议易遭受到各种攻击。2011年,Islam等(ISLAM SK H, BISWAS G P. Improved remote login scheme based on ECC. IEEE-International Conference on Recent Trends in Information Technology. Washington, DC: IEEE Computer Society, 2011: 1221-1226)提出一种改进的基于椭圆曲线的远程登录协议,该协议存在着被盗校验子攻击和客户身份冒充攻击,同时并未能提供双向认证。为了解决此类问题提出了一种基于椭圆曲线的远程认证和密钥协商协议(RAKA),RAKA基于椭圆曲线离散对数难题,在执行过程中只需做6次点乘运算和7次哈希运算,比Islam等协议少用1次点乘运算,协议效率提高约15%,是一种比Islam等协议更安全、高效的协议。

关键词: 密码学, 认证, 协议, 椭圆曲线密码系统, 密钥协商, 口令

Abstract: Password-based authentication and key exchange protocol have been widely used in various network services due to easy memory of password. Unfortunately, password-based authentication scheme also suffers from attacks because of the low entropy of password. In the year 2011, Islam et al.(ISLAM SK H, BISWAS G P. Improved remote login scheme based on ECC. IEEE-International Conference on Recent Trends in Information Technology. Washington, DC: IEEE Computer Society, 2011: 1221-1226)proposed an improved remote login scheme based on Elliptic Curve Cryptography (ECC).Whereas, the scheme was vulnerable to stolen-verifier and impersonation attacks and failed to provide mutual authentication. Therefore, the authors proposed a password-based Remote Authentication with Key Agreement (RAKA) protocol using ECC to tackle the problems in Islam et al.'s scheme. RAKA was based on Elliptic Curve Discrete Logarithm Problem (ECDLP) and needed to compute six elliptic curve scale multiplications and seven hash function operations during a protocol run. The efficiency improves by about 15%〖BP(〗 percent〖BP)〗. It is more secure and efficient than Islam et al.'s scheme.

Key words: cryptography, authentication, protocol, Elliptic Curve Cryptosystem (ECC), key agreement, password

中图分类号: