版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、1在電腦網路應用環境中的身份認證與金在電腦網路應用環境中的身份認證與金鑰協議技術之研究鑰協議技術之研究 Advisor: Dr. Chin-Chen Chang Student: Hao-Chuan Tsai Date: 12.30.2010 Department of Computer Science and Information Engineering, National Chung Cheng University2 Part I: Authentication Scheme with Key Agreement three party authenticated key agreem
2、ent Part II: Anonymous Authentication Scheme for Wireless Networks34 Goal: Convince system of your identity before it can act on your behalf Methods Who you are What you know What you have5 What you have Verify identity based on possession of some object Magnetic Card Smart Card (IC Card)8.56cm5.39c
3、m1.923cm1.025cm6Who you areverify identity based on your physical characteristics or involuntary response patterns known as biometrics characteristics used include: signature (usually dynamic) fingerprinthand geometry face or body profile speech retina pattern always have tradeoff between false reje
4、ction and false acceptance 7What you knowBirthday, School name, Blood type, or Salary ?Meaningful Secrets ?Meaningless Secrets (Passwords) !Traditional Password MechanismProcedure: 1. Prompt user for a login name and password 2. Verify identity by checking that password is correct Passwords in the S
5、ystem: May be stored in clear mode May be stored in cipher mode: Encrypted or One-Way HashedPasswords should be selected with care to reduce risk of exhaustive search One problem with traditional passwords is caused by eavesdropping their transfer over an insecure network 8 Password Practice Passwor
6、d Complexity Criteria At least 7 characters long. Does not contain your User Name, Real Name, or Company Name. Does not contain a complete dictionary word. Is significantly different from previous passwords. Contains characters from each of the following groups: uppercase letters lowercase letters n
7、umerals symbols found on the keyboard.9 Create Session Keys Key transport A session key is selected by one communication party and is distributed to others in some way Key agreement A session key is established by the cooperating of all communication parties10Drawbacks of 2PAKA Given N parties there
8、 are N(N-1)/2 (=nC2) secret keys that should be established each party should securely store N-1 secret keys Awkward for larger-scale networks Inflexible (difficult to add, update, or delete a party)ExampleIf N = 6, then there are 6(6-1)/2 = 15 secret keys should be established in advance.11An authe
9、nticated key agreement protocol is an interactive method for two or more parties to determine session keys based on their secret keys or public/private keys.AuthenticationAuthenticationKey agreement / key exchangeSKSecure communication Trusted server1213 Impersonation attacks Impersonate clients or
10、the server Man-in-the-middle attacks On-line password guessing attacks Off-line password guessing attacks The most powerful attack14 The server needs to authenticate the communication clients explicitly The established session key would not revealed to either the server or others Round efficiency15
11、Initial phase The server computes And then the server computes Server also finds a value rc to satisfy the equationand computes (,)CCHCpw( ,)CH C skm o dCCCrqm o dCrCgp16ABS1.2.1ApwxXgM2(| )xxAXgHgA B1Bp wyYgN2(|)yyBYgHgB A1ApwxXgM2(| )xxAXgHgA B17ABS3compute,(|)xyzABskHABSg/ApwxgX M/BpwygY Nretriev
12、e derive (|)xAHgA B(|)yBHgBA)|(|)|(AyzpwAxyzgHgSBAHgXA)|(|)|(BxzpwByxzgHgSABHgYB4)|(|)|(BxzpwByxzgHgSABHgYBcompute,(|)xyzABskHABSg1819H L R1VLR2VLR3VLRMSMSMSRoaming path20Multiple regional domainEach domain is operated under a different administrationHLR (Home Location Register)HLR is used to denote
13、 the home domain, the home domain server, and the home location register, concurrently.A subscriber has only one home as his administrative domain One who desiring to contact MS must consult his HLR. VLR (Visiting Location Register)VLR is used to denote the visiting domain, the visiting domain serve
14、r, and the visiting location register, concurrently.When a subscriber roams into a visited domain, he should initially establish a residence within that domain.21HLRMSVLRIMSIIMSI, VLRIMSI, (RAND1, SRES1, Kc1), (RAND2, SRES2, Kc2), , (RANDn , SRESn, Kcn).RAND1SRES1 enc_with_ A5(Kc1, TMSI)Computes: SR
15、ES1 = A3(Ki, RAND1), Kc1 = A8(Ki, RAND1) SRES2 = A3(Ki, RAND2), Kc2 = A8(Ki, RAND2) SRESn = A3(Ki, RANDn), Kcn = A8(Ki, RANDn) Computes: (inside SIM) SRES1 = A3(Ki, RAND1) Kc1 = A8(Ki, RAND1) Computes: enc_with_ A5(Kc1, TMSI) Decrypts: enc_with_ A5(Kc1, TMSI)(Unspecified Secure Channel)Multiple on-t
16、he-fly triplets s h o u l d b e o n - l i n e generated and transferred in batch to the VLR. Then, VLR can use them in successive authentication flows with the roaming MS.VLR needs to ensure that MS is currently in good status. MS establishes a temporary residence in the visited domain.22VLRTMSIRAND
17、mSRESm Computes: (inside SIM) SRESm = A3(Ki, RANDm) Kcm = A8(Ki, RANDm) enc_with_A5(Kcm, messages)MSVLRTMSI, RANDmSRESm Computes: (inside SIM) SRESm = A3(Ki, RANDm) Kcm = A8(Ki, RANDm)enc_with_A5(Kcm, messages)MSWhen MS makes a call, the origination protocol is then invoked to authenticate himself t
18、o VLR and establish a session key.23242526 The main problems we suffer Impersonation Attack Attackers can impersonate either MS or FA to obtain secret information Personal Privacy Problem The identity of MS can be revealed to others27 The proposed scheme has the following characteristics Provide mut
19、ual authentication A mobile client and the communicating entities can be authentic An established session key would not revealed to either the uninvolved servers or others Diverting the most complicated operations to either the HLR or VLR The risk of compromising the secret information stored on HLR is reduced Ensure anonymity28 Initial phase Sh choose
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 副园长个人述职报告(12篇)
- 幼儿园的表扬信范文集锦7篇
- 专业认知实习报告范文汇编6篇
- 2024年版建筑工人个人劳务服务协议版
- 销售上半年工作总结感想10篇
- 财务年度工作总结七篇
- 前台的实习报告模板集合9篇
- 八年级道德与法治上册 第三单元 法律在我心中 第九课 从署名权说起 第2框 信守合同教学实录 人民版
- 辞职申请书模板集锦7篇
- 新进员工试用期总结范文
- 北京市石景山区2023-2024学年七年级上学期期末考试数学试卷(含答案)
- 2025版寒假特色作业
- Unit 7 Will people have robots Section B 1a-1e 教学实录 2024-2025学年人教版英语八年级上册
- 江西省吉安市2023-2024学年高一上学期1月期末考试政治试题(解析版)
- 国内外航空安全形势
- 《雷达原理》课件-1.1.6教学课件:雷达对抗与反对抗
- 2024年版汽车4S店商用物业租赁协议版B版
- 微信小程序云开发(赤峰应用技术职业学院)知到智慧树答案
- 辽宁省抚顺市清原县2024届九年级上学期期末质量检测数学试卷(含解析)
- 2024-2025学年上学期福建高二物理期末卷2
- 2024-2025年第一学期小学德育工作总结:点亮德育灯塔引领小学生全面成长的逐梦之旅
评论
0/150
提交评论