论文部分内容阅读
密钥交换的SAKA协议存在三大安全缺陷。为克服这些缺陷,人们提出了改进的Lin协议、E-SAKA协议和改进的E-SAKA协议。通过分析发现E-SAKA协议及其改进算法仍然会受到密钥猜测攻击,并且E-SAKA协议中攻击者能获得会话密钥。进一步提出了一个基于Lin协议的改进协议,并论证此协议在防止中间人攻击和解决SAKA协议的三大缺陷的同时,能有效抵挡在线猜测攻击。
There are three major security flaws in the SAKA protocol for key exchange. To overcome these shortcomings, improved Lin protocol, E-SAKA protocol and improved E-SAKA protocol have been proposed. It is found through analysis that the E-SAKA protocol and its improved algorithm will still be attacked by the key speculation, and the attacker in the E-SAKA protocol can obtain the session key. Furthermore, an improved protocol based on the Lin protocol is proposed. The protocol can effectively resist the online guess attacks while preventing the man-in-the-middle attacks and the SAKA protocol’s three major shortcomings.