Universally composable secure TNC model and EAP-TNC protocol in IF-T  被引量:12

Universally composable secure TNC model and EAP-TNC protocol in IF-T

在线阅读下载全文

作  者:ZHANG JunWei MA JianFeng MOON SangJae 

机构地区:[1]Key Laboratory of Computer Networks and Information Security (Ministry of Education), Xidian University, Xi'an 710071, China [2]Mobile Network Security Technology Research Center, Kyungpook National University, Daegu 702-701, Korea

出  处:《Science China(Information Sciences)》2010年第3期465-482,共18页中国科学(信息科学)(英文版)

基  金:supported by the National High-Tech Research & Development Program of China (Grant Nos.2007AA01Z429, 2007AA01Z405);the Major Program of the National Natural Science Foundation of China (GrantNo. 60633020);the National Natural Science Foundation of China (Grant Nos. 60573036, 60702059,60503012,60872041);the Korea Research Foundation Grant funded by the Korean Government (Grant No. KRF-2008-521-D00449)

摘  要:This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the EAP ideal functionality FEAP and the EAP-TNC ideal functionality FE-PA. Then, we construct a trusted network connect protocol named TK-TNC that UC-realizes FTNC in the (FEAP, FE-PA)- hybrid model. Subsequently, we perform a security analysis on protocol D-H PN given in the TCG specification and show that this protocol cannot securely realize the EAP-TNC ideal functionality and be resistant to an attack. Finally, we propose an alternative protocol using the twin Diffie-Hellman key-exchange technique, named protocol TD-H PN, which can securely realize the EAP-TNC ideal functionality in the (FREG, FCERT)-hybrid model.This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality FTNC, the EAP ideal functionality FEAP and the EAP-TNC ideal functionality FE-PA. Then, we construct a trusted network connect protocol named TK-TNC that UC-realizes FTNC in the (FEAP, FE-PA)- hybrid model. Subsequently, we perform a security analysis on protocol D-H PN given in the TCG specification and show that this protocol cannot securely realize the EAP-TNC ideal functionality and be resistant to an attack. Finally, we propose an alternative protocol using the twin Diffie-Hellman key-exchange technique, named protocol TD-H PN, which can securely realize the EAP-TNC ideal functionality in the (FREG, FCERT)-hybrid model.

关 键 词:network security universally composable security trusted network connect 

分 类 号:TP311.13[自动化与计算机技术—计算机软件与理论] F276.7[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象