• DocumentCode
    492177
  • Title

    Research on Formal Design of Key Exchange Protocol in Trusted Computing

  • Author

    Ma, Yuchi ; Li, Yifa

  • Author_Institution
    Dept. of Appl. Math., Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou
  • fYear
    2008
  • fDate
    21-22 Dec. 2008
  • Firstpage
    632
  • Lastpage
    635
  • Abstract
    The problem of trusted network connection (TNC) protocol extension is analyzed. Abiding by standards of trusted computing group, based on the security goals of key exchange in trusted computing environment, this paper proposes a key exchange protocol for TNC (KEPTNC) using authentication tests to construct the only transforming edge between the two communication entities. The secure properties of KEPTNC are formally proved with strand space model and authentication tests. KEPTNC can provide secure negotiation of session key and security association (SA), protection of endpoints´ identities, verification of platform integrity, and mutual authentication between the initiator and the responder. It needs only three messages and less computational load, and it is simple and efficient.
  • Keywords
    protocols; security of data; formal design; key exchange protocol; trusted computing; trusted network connection protocol; Access protocols; Authentication; Computer networks; Cryptographic protocols; Cryptography; Information science; Mathematics; Process design; Security; Testing; authentication test; key exchange; strand space model; trusted computing; trusted network connection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Knowledge Acquisition and Modeling Workshop, 2008. KAM Workshop 2008. IEEE International Symposium on
  • Conference_Location
    Wuhan
  • Print_ISBN
    978-1-4244-3530-2
  • Electronic_ISBN
    978-1-4244-3531-9
  • Type

    conf

  • DOI
    10.1109/KAMW.2008.4810568
  • Filename
    4810568