首页> 外文会议>Conference of Open Innovations Association >Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance
【24h】

Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance

机译:用于预先执行安全设备配对过程的移动单元的Diffie-Hellman协议认证

获取原文

摘要

It is well known that Diffie-Hellman key distribution protocol is vulnerable to a man-in-the-middle attack for which an adversary manages to share the key with the legitimate users. In order to protect the protocol against such attack it is necessary to authenticate so called Diffie-Hellman values using some additional secret information shared by the legitimate users in advance. For mobile units using for a communication between portable devices, it is very appropriate to extract an authenticating information executing the secret device pairing process. But the drawback of this method is a little disagreement between authenticating strings of different users. The mathematical model of the described scenario is a binary symmetric channel without memory. An authentication method based on the use of such additional strings slightly corrupted by errors and followed by executing the hash functions chosen from strongly universal- hash function class is considered. The formulas for probabilities of the undetected deception and the false alarm are proved. In addition, the methods of parameter optimization, i.e. the number of blocks and the full authenticator length, are proposed.
机译:众所周知,Diffie-Hellman密钥分发协议容易受到中间人攻击的攻击,对手与合法用户共享关键。为了保护协议免受这种攻击,必须使用合法用户提前共享的一些额外秘密信息来验证所谓的diffie-hellman值。对于使用便携式设备之间的通信的移动单元,提取执行秘密设备配对处理的验证信息非常合适。但是这种方法的缺点是验证不同用户的串之间的略有分歧。所描述的场景的数学模型是没有存储器的二进制对称信道。考虑了一种认证方法,基于使用错误稍微损坏的这种附加字符串,然后执行从强普通哈希函数类中选择的散列函数。证明了未检测到的欺骗和误报的概率。另外,提出了参数优化的方法,即块的数量和完整的认证器长度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号