节点文献

一种对等通信可调密钥自动生成的策略

An Adjustable Secure Key Automatic Establishment for Peer to Peer Communication

【作者】 曾华

【导师】 高世臣;

【作者基本信息】 中国地质大学(北京) , 应用数学, 2006, 硕士

【摘要】 本文研究对等通信(Peer to Peer Communication)中信息安全的关键技术:密钥自动生成策略。当前信息安全涉及很多方面,其中密码算法的安全性是一个重要环节,但是如果要完全保证密码算法不被泄漏是不可能的,所以当前信息安全领域一般公开密码算法,而通过其用来加密的密钥的保密性来确保信息的安全,所以密钥的管理和交换也是信息安全的一个关键技术。本文通过分析当前流行的密钥管理和交换协议(如 Diffie-Hellman 密钥交换协议和 PKI 技术),针对其固有的缺点,提出一种可调密钥自动生成的策略。此方法主要分为四个阶段:建立原始密钥、从原始密钥中提取信息、使用纠错码技术纠错密钥、密钥可控性。通过此策略,我们可以生成任意长度的密钥供用户在对称加密算法中使用。生成密钥后,为了验证其结果确实满足密钥的基本要求——随机性,我们还将使用一套测试工具(NIST),测试密钥的随机性质。通过测试,说明它具有良好随机性,可用于各种对称加密算法。此策略生成的密钥用于对等通信中的信息加密,与现有的密钥交换协议和PKI 技术相比,技术更简单、更安全、更易于使用和管理,且密钥长度可调、可随时间更换。

【Abstract】 A crucial technique of information secure for peer to peercommunication—adjustable secure key automatic establishment method is discussedin this paper.Currently, the technique of information secure include many factors. Amongthem, the secure of cryptographical method is a important part. But it is impossible forus to ensure the cryptographical method not to be leaked. So people used to make themethod open and ensure the security of information by the security of securepassword. The management and exchange of the secure password is also a keytechnique of the information secure.By analyzing the popular protocol of key management and exchange(such asDiffie-Hellman----the key exchange agreement and the PKI technique), aiming atadvantages and disadvantages of these protocols, we put forword a kind of newtechnique for peer to peer communication. This method mainly is divided into fourstage:the raw key generation, the key distillation, the key rectification and the keycontrolment. By the strategy, we can establish the key with arbitary length to use insymmetrily encryption.After the key generation, in order to verify its result to really satisfy the basicrequest of the key- randomicity, we will use a set of test tool(NIST) to test the randomproperty of the key. Passing the test, the key has a well randomicity and can used forvarious symmetry encryption.Using this technique, we can build a secure key for information encryption. It ismore simple and secure than PKI technique. It is easy to use and manage. Meanwhilethe key built by this way is adjustable in length and existence period.

  • 【分类号】TN918.1
  • 【下载频次】32
节点文献中: 

本文链接的文献网络图示:

本文的引文网络