{"title":"一种高效安全的密钥协商协议的分析与改进","authors":"Jiyun Yang, Rui Zhang, D. Xiao","doi":"10.1109/CIS.2013.117","DOIUrl":null,"url":null,"abstract":"Improperly chosen parameters will lead to short period distribution of sequences generated by Chebyshev maps over finite fields ZN. However, in a key agreement protocol proposed by Yoon, et al. there is no consideration given to the avoidance of short period distribution. Based on the theory of period distribution the protocol is broken with other information gained from the key establishment process. In this paper, the protocol of Yoon, et al. is broken and improved by getting rid of unnecessary information and encrypting sensitive information, which makes the protocol more secure.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Analysis and Improvement of an Efficient and Secure Key Agreement Protocol\",\"authors\":\"Jiyun Yang, Rui Zhang, D. Xiao\",\"doi\":\"10.1109/CIS.2013.117\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Improperly chosen parameters will lead to short period distribution of sequences generated by Chebyshev maps over finite fields ZN. However, in a key agreement protocol proposed by Yoon, et al. there is no consideration given to the avoidance of short period distribution. Based on the theory of period distribution the protocol is broken with other information gained from the key establishment process. In this paper, the protocol of Yoon, et al. is broken and improved by getting rid of unnecessary information and encrypting sensitive information, which makes the protocol more secure.\",\"PeriodicalId\":294223,\"journal\":{\"name\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2013.117\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2013.117","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis and Improvement of an Efficient and Secure Key Agreement Protocol
Improperly chosen parameters will lead to short period distribution of sequences generated by Chebyshev maps over finite fields ZN. However, in a key agreement protocol proposed by Yoon, et al. there is no consideration given to the avoidance of short period distribution. Based on the theory of period distribution the protocol is broken with other information gained from the key establishment process. In this paper, the protocol of Yoon, et al. is broken and improved by getting rid of unnecessary information and encrypting sensitive information, which makes the protocol more secure.