Computer Engineering and Applications ›› 2012, Vol. 48 ›› Issue (4): 94-96.

• 网络、通信、安全 • Previous Articles     Next Articles

Security analysis of mutual-authentication cryptographic protocol in network management

YU Lei, WEI Shimin   

  1. School of Computer Science & Technology, Huaibei Normal University, Huaibei, Anhui 235000, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2012-02-01 Published:2012-04-05

网络管理中一种互认证密码协议的安全性分析

余 磊,魏仕民   

  1. 淮北师范大学 计算机科学与技术学院,安徽 淮北 235000

Abstract: Based on the minimal members theory and ideals theory of strand space model, from the authentication and secret aspects, formal analysis is carried on to a mutual-authentication cryptographic protocol which is used in network management , and through the analysis the redundancy which exists in the protocol is discovered and the corresponding improvement is proposed. Meanwhile in the aspect of authentication design to a protocol, the difference is pointed out between the authentication protocols based on the asymmetrical cryptographic system and one based on the symmetrical cryptographic system.

Key words: strand space, authentication protocol, authentication, secrecy

摘要: 基于串空间模型的极小元和理想理论,对网络管理中的一种互认证密码协议进行保密性和认证性分析,通过分析发现该协议存在冗余部分,并提出相应的改进方案;同时在协议的认证性设计方面,指出基于非对称密码系统和对称密码系统的认证协议的区别。

关键词: 串空间, 认证协议, 认证性, 保密性