首页 | 本学科首页   官方微博 | 高级检索  
     检索      

抵抗基于长度攻击的方法
引用本文:陈乐,曹珍富.抵抗基于长度攻击的方法[J].上海交通大学学报,2010,44(7):968-0974.
作者姓名:陈乐,曹珍富
作者单位:(上海交通大学 电子信息与电气工程学院,上海 200240)
摘    要:提出了改进的Thompson群上的密钥交换协议,对字的生成过程进行控制,并设计实验证明了其拥有更强的安全性,可以抵御基于长度的攻击算法.由于基于长度的攻击在其他非交换群上的应用类似,该改进方法对其他非交换群上的密钥交换协议也同样适用.

关 键 词:基于长度的攻击    密钥交换协议    Thompson群  
收稿时间:2009-5-20

Approaches to Resisting Length Based Attack
CHEN Le,CAO Zhen fu.Approaches to Resisting Length Based Attack[J].Journal of Shanghai Jiaotong University,2010,44(7):968-0974.
Authors:CHEN Le  CAO Zhen fu
Institution:(School of Electronic, Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240, China)
Abstract:This paper proposed the key exchange protocol based on Thompson’s group, which controls the process of generating words, and designed experiments to show that the protocol can resist the length based attack. Moreover, because the length based attacks on other non commutative groups are similar to the one on Thompson’s group, it suggests that the approaches can be applied to any other non commutative group to resist the length based attack on that group.
Keywords:
本文献已被 CNKI 等数据库收录!
点击此处可从《上海交通大学学报》浏览原始摘要信息
点击此处可从《上海交通大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号