论文部分内容阅读
Diffie-Hellman协议不具有认证功能且不能抵抗中间人攻击。Seo等人提了一种简单的算法(SAKA)协议可以抵抗中间人攻击且运算简单,但是SAKA协议也存在不足。另有人提出了Lin协议、E-SAKA协议等。分析上述协议可看出存在不足。于是提出改进的新密钥交换协议。它具有SAKA及其改进协议优点的同时可以避免SAKA及其改进协议的缺陷。并给出该协议的BAN逻辑形式分析。
Diffie-Hellman protocol does not have authentication capabilities and can not resist man-in-the-middle attacks. Seo et al. Proposed a simple algorithm (SAKA) protocol that can resist man-in-the-middle attacks and has a simple operation, but there is also a shortage of the SAKA protocol. Others proposed the Lin agreement, E-SAKA agreement and so on. Analysis of the above agreement shows that there are deficiencies. So proposed a new key exchange agreement. It has the benefits of SAKA and its improved protocol while avoiding the flaws of SAKA and its improved protocol. And gives the BAN logical form analysis of the agreement.