您的位置: 专家智库 > >

国家自然科学基金(BK2006108)

作品数:2 被引量:1H指数:1
相关作者:胡爱群杨晓辉更多>>
相关机构:东南大学更多>>
发文基金:国家自然科学基金更多>>
相关领域:自动化与计算机技术更多>>

文献类型

  • 2篇中文期刊文章

领域

  • 2篇自动化与计算...

主题

  • 2篇ROBUST
  • 1篇NETWOR...
  • 1篇BASED_...
  • 1篇EMAIL
  • 1篇IMPROV...

机构

  • 2篇东南大学

作者

  • 2篇胡爱群
  • 1篇杨晓辉

传媒

  • 2篇Journa...

年份

  • 1篇2009
  • 1篇2008
2 条 记 录,以下是 1-2
排序方式:
Formal analysis of robust email protocol based on authentication tests被引量:1
2009年
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.
蒋睿胡爱群
Improvements on robust email protocols with perfect forward secrecy
2008年
According to the security shortages of two robust practical email protocols with perfect forward secrecy, attacks on the two protocols are analyzed and corresponding improvements on the two protocols are proposed. First, by analyzing the two email protocols, the corresponding man-in-the-middle attacks are proposed, where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him. Consequently, the man-in-the-middle attacks can make the two protocols fail to provide perfect forward secrecy. Secondly, by adding corresponding signatures in the receiving phases of the two protocols, two corresponding improvements on the protocols are proposed to overcome the man-in-the-middle attacks on the two protocols and make them provide perfect forward secrecy. Moreover, the two improved protocols can retain all the merits of the former protocols.
蒋睿胡爱群杨晓辉
关键词:EMAIL
共1页<1>
聚类工具0