论文部分内容阅读
鉴别是验证通信对方是否真正的通信伙伴而不是冒充者的过程。面对各种有恶意的主动攻击者,要验证一个远程进程的身份需要使用基于密码术的复杂协议。鉴别协义所用的一般模型是这样的:假设会话发起方A(一个进程)想与用户B建立安全的连接。A发送一条消息给B,接着双方进行一系列的消息交换,在此期间,攻击者通过拦截、篡改或重播等途径破坏A和B的正常通信。鉴别协议的作用是:在鉴别协议信息交互结束之后,A和B能确认对方。在多数协议中,A和B还会建立—个共享会话密钥在后面对话中使用。 常用的用户鉴别方式有:
Authentication is the process of verifying whether a communication partner is a true communication partner, rather than an impersonator. Faced with a variety of malicious active attackers, to verify the identity of a remote process requires the use of complex protocols based on cryptography. The general model used for authentication protocol is as follows: Suppose Session Initiator A (a process) wants to establish a secure connection with User B. A sends a message to B, then the two parties exchange a series of messages, during which time the attacker intercepts, tampers or rebroadcasts and destroys the normal communication between A and B. The role of the authentication protocol is: After the authentication protocol information interaction ends, A and B can confirm each other. In most protocols, A and B also set up - a shared session key to use later in the conversation. Common user authentication methods are: