|
基于SM9和FALCON的密钥交换协议设计
|
Abstract:
SM9是我国首个全体系纳入ISO/IEC标准的标识密码算法,FALCON是NIST后量子竞赛优胜算法。本文基于SM9和FALCON设计了一个新的密钥交换协议。协议通过校验FALCON签名的有效性来鉴别信息发送方的身份,基于SM9公钥加密算法保障共享的256比特秘密数据串的机密性,通过密钥派生函数,利用双方生成的随机数据串和双方的标识信息生成一个定长的共享会话密钥。结合BAN逻辑证明和非形式化分析方法,对协议的安全性进行了证明。本文协议具有抵抗重放攻击、中间人攻击和拒绝服务攻击的能力。基于FALCON数字签名算法实现参与双方身份的真实性和不可否认性,具有抗量子攻击的特性。
SM9 is the first identity cryptographic algorithm in China whose whole system is included in the ISO/IEC standard, and FALCON is the winner of the NIST post-quantum competition. The protocol identifies the message sender by verifying the validity of the FALCON signature, guarantees the confidentiality of the shared 256-bit secret data string based on the SM9 public key encryption algorithm, and generates a fixed-length shared session key using the random data string generated by both parties and the identification information of both parties through a key derivation function. The security of the protocol is proved by combining BAN logic and non-formal analysis methods. This protocol has the ability to resist replay attacks, man in the middle attacks, and denial of service attacks. The protocol designed in this paper achieves the authenticity and non-repudiation of the identities of the participating parties and is resistant to quantum attacks through the application of the FALCON digital signature algorithm.
[1] | Shamir, A. (1985) Identity-Based Cryptosystems and Signature schemes. In: Blakley, G.R. and Chaum, D., Eds., Advances in Cryptology: Proceedings of CRYPTO’84, Springer, Berlin, 47-53. https://doi.org/10.1007/3-540-39568-7_5 |
[2] | Boneh, D. and Franklin, M. (2001) Identity-Based Encryption from the Weil Pairing. Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology Conference, Santa Barbara, 19-23 August 2001, 213-229.
https://doi.org/10.1007/3-540-44647-8_13 |
[3] | 陈晓, 程朝晖, 张振峰, 等. GB/T 38635.2-2020, 信息安全技术SM9标识密码算法第2部分: 算法[S]. 2020. |
[4] | 王小云, 李峥, 王永传, 等. GB/T 32905-2016, 信息安全技术SM3密码杂凑算法[S]. 2016. |
[5] | Fouque, P.A., Hoffstein, J., Kirchner, P., et al. (2018) FALCON: Fast-Fourier Lattice-Based Compact Signatures over NTRU. https://falcon-sign.info/falcon.pdf |
[6] | 王圣宝, 周鑫, 文康, 翁柏森. 适用于智能电网的三方密钥交换协议[J]. 通信学报, 2023, 44(2): 210-218. |
[7] | Burrows, M., Abadi, M. and Needham, R. (1990) A Logic of Authentication. ACM Transactions on Computer Systems (TOCS), 8, 18-36. https://doi.org/10.1145/77648.77649 |
[8] | 张敏, 许春香, 张建华. 无人机网络中基于多因子的认证密钥协商协议研究[J]. 信息网络安全, 2022, 22(9): 21-30. |
[9] | Shor, P.W. (1999) Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Review, 41, 303-332. https://doi.org/10.1137/S0036144598347011 |
[10] | 梁敏, 罗宜元, 刘凤梅. 抗量子计算对称密码研究进展概述[J]. 密码学报, 2021, 8(6): 925-947.
https://doi.org/10.13868/j.cnki.jcr.000488 |
[11] | 宋昭阳, 王一诺, 王浩文, 马鸿洋. 基于Hopfield网络“伪吸引子”与交替量子随机行走的抗攻击彩色图像加密方案[J/OL]. 电子学报: 1-13. http://kns.cnki.net/kcms/detail/11.2087.tn.20230330.0928.008.html, 2023-04-11. |
[12] | 吕述望, 李大为, 邓开勇, 等. GB/T 32907-2016, 信息安全技术SM4分组密码算法[S]. 2016. |
[13] | 何烜, 王红军, 袁泉. 可证明安全的射频识别双向认证协议[J]. 空军工程大学学报(自然科学版), 2018, 19(5): 41-46. |
[14] | Gentry, C., Peikert, C. and Vaikuntanathan, V. (2008) Trapdoors for Hard Lattices and New Cryptographic Constructions. Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, 17-20 May 2008, 197-206.
https://doi.org/10.1145/1374376.1374407 |
[15] | Damgard, I. (1990) A Design Principle for Hash Functions. In: Brassard, G., Ed., CRYPTO’1989, Springer, Berlin, 416-427. https://doi.org/10.1007/0-387-34805-0_39 |
[16] | Merkle, R.C. (2001) A Certified Digital Signature. In: Brassard, G., Ed., Advances in Cryptology—CRYPTO’89 Proceedings, Springer, New York, 218-238. https://doi.org/10.1007/0-387-34805-0_21 |
[17] | 李大为, 冯登国, 陈华, 等. GB/T 32915-2016, 信息安全技术二元序列随机性检测方法[S]. 2016. |
[18] | 王小云, 于红波. SM3密码杂凑算法[J]. 信息安全研究, 2016, 2(11): 983-994. |
[19] | 陆成刚, 王庆月. 一次一密理论的再认识[J]. 高校应用数学学报A辑, 2022, 37(4): 426-430.
https://doi.org/10.13299/j.cnki.amjcu.002240 |