上海交通大学学报(自然版)

• 自动化技术、计算机技术 • 上一篇    下一篇

抵抗基于长度攻击的方法

陈乐,曹珍富   

  1. (上海交通大学 电子信息与电气工程学院,上海 200240)
  • 收稿日期:2009-05-20 修回日期:1900-01-01 出版日期:2010-07-28 发布日期:2010-07-28

Approaches to Resisting LengthBased Attack

CHEN Le,CAO Zhenfu   

  1. (School of Electronic, Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240, China)
  • Received:2009-05-20 Revised:1900-01-01 Online:2010-07-28 Published:2010-07-28

摘要: 提出了改进的Thompson群上的密钥交换协议,对字的生成过程进行控制,并设计实验证明了其拥有更强的安全性,可以抵御基于长度的攻击算法.由于基于长度的攻击在其他非交换群上的应用类似,该改进方法对其他非交换群上的密钥交换协议也同样适用.

关键词: 基于长度的攻击, 密钥交换协议, Thompson群

Abstract: This paper proposed the key exchange protocol based on Thompson’s group, which controls the process of generating words, and designed experiments to show that the protocol can resist the lengthbased attack. Moreover, because the lengthbased attacks on other noncommutative groups are similar to the one on Thompson’s group, it suggests that the approaches can be applied to any other noncommutative group to resist the lengthbased attack on that group.

中图分类号: