一类密钥同步更新的组合校验认证方法  被引量:2

A Class of Combination Verification and Authentication Method for Synchronous Key Update

在线阅读下载全文

作  者:张岚[1] 何良生 郁滨 ZHANG Lan;HE Liangsheng;YU Bin(The PLA Information Engineering University,Zhengzhou 450001,China;State Cryptography Administration,Beijing 100036,China)

机构地区:[1]战略支援部队信息工程大学,郑州450001 [2]国家密码管理局,北京100036

出  处:《电子与信息学报》2023年第12期4509-4518,共10页Journal of Electronics & Information Technology

摘  要:针对一对多通报关系实体认证与密钥协商应用环境的无线目标身份识别同步认证问题,该文设计了双密钥组合校验定理,提出并证明了交互式动态认证与工作密钥同步更新定理,基于可信标识动态密钥匹配规则构建了密钥同步更新的组合校验认证模型,提出了一类密钥同步更新的组合校验认证方法,给出了双密钥组合校验、消息适度重传、模拟信道信噪比合理仿真等无线目标身份识别协议设计准则,突破了无线目标身份识别协议同步认证难的关键技术,解决了实体认证与密钥协商中实体身份动态认证、工作密钥同步更新难题。以一类无线目标身份识别协议为例,分析说明了该类方法的具体应用。基于串空间理论构造攻击方法给出了该协议的形式化证明,并通过常规攻击方法分析了该协议的实际安全性。与其他交互式密码协议同步认证设计方法相比较,该方法具有动态可认证性,由该方法设计的交互式密码协议同步认证方案,安全性高,计算量小,仅进行一次迭代运算,可应用于大规模复杂环境中的无线目标身份识别。In view of the problem of synchronous authentication of wireless target identification in the application environment of one-to-many notification relationship entity authentication and key agreement,a double key combination verification theorem is designed.The theorem of interactive dynamic authentication and working key synchronization uopdate is proposed and proved.Based on the dynamic key matching rule of trusted identity,a combinatorial verification authentication model of key synchronization update is constructed.A kind of key synchronous updating combinatorial verification authentication method is proposed.The design criteria of wireless target identification protocol,such as double key combination verification,moderate message retransmission,reasonable simulation of analog channel signal-to-noise ratio,are given.It breaks through the key technology of synchronization authentication in the wireless target identification protocol.The problem of dynamic authentication of entity identity and synchronous updating of working key in entity authentication and key agreement is solved.Taking a class of wireless target identification protocols as an example,the application of this kind of methods is analyzed and illustrated.The formal proof of the protocol is given by a class of constructive attack methods based on strand space theory,and the actual security of the protocol is analyzed by conventional attack methods.Compared with other design methods of synchronous authentication for interactive cryptographic protocols,this method has dynamic authentication.The synchronous authentication scheme designed by this method has the advantages of high security,less computation and only one iteration,which can be applied to wireless target identification in large-scale and complex environment.

关 键 词:密钥同步更新 动态可认证性 双密钥组合校验 基于串空间理论构造攻击方法 

分 类 号:TN918.1[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象