Research of Session Initial Protocol Security Mechanism on Public Key Technique

来源 :Wuhan University Journal of Natural Sciences | 被引量 : 0次 | 上传用户:BecauseArc
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Two common kinds of security mechanisms used in session initial protocol (SIP) are analyzed.An improved HTTP digest authentication scheme is put forward based on the existing SIP authentication theories.This mechanism is combined with the merits of the HTTP digest authentication and the public key encryption,so the communicating parties complete two-way authentication and public key exchange in pre-calling,and the session key can be randomly generated in post-calling.The mixture of security encryption mechanism with public key encryption and symmetric-key encryption algorithm can ensure the security for network communication data.The emulation of the scheme is verified,and the security analysis is conducted in the end.The researches show that the simulations efficiency of this method is about 78% of HTTP’s,and it can prevent four kinds of attacks including impersonating a server,offline password guessing attacks,relay-attack,and session monitoring. Two common kinds of security mechanisms used in session initial protocol (SIP) are analyzed. An improved HTTP digest authentication scheme is put forward based on the existing existing SIP authentication theories. This mechanism is combined with the merits of the HTTP digest authentication and the public key encryption, so the communicating parties complete two-way authentication and public key exchange in pre-calling, and the session key can be randomly generated in post-calling. The mixture of security encryption mechanism with public key encryption and symmetric-key encryption algorithm can ensure the security for network communication data. The emulation of the scheme is verified, and the security analysis is conducted in the end. Researches show that the simulations efficiency of this method is about 78% of HTTP’s, and it can prevent four kinds of of attacks including impersonating a server, offline password guessing attacks, relay-attack, and session monitoring.
其他文献
事件概述rn秋季开学伊始,一场幼儿园食物中毒事件引发了舆论关注.9月5日晚7时许,南昌市红谷滩新区和青山湖区部分幼儿出现不同程度的呕吐等症状,初步怀疑是由食物中毒引起.据
虚拟内窥镜是医学可视化技术和虚拟现实技术相结合的产物,近年来在临床领域得到了越来越多的应用.本文研究了实现虚拟内窥镜自动漫游的关键技术,提出了基于推拉模型的中心路
汉字签名鉴别就是利用计算机自动识别一个手写签名样本的真伪,从而作为个人身份的证明.本文对汉字签名的脱机处理过程中三个主要方面--信息预处理、静态和伪动态特征的选择和
事件概述rn8月30日,中央第二环境保护督察组向浙江湖州转交了反映“三天门附近地下埋有死猪”的实名举报信访件.当天下午3时30分,根据信访举报人和犯罪嫌疑人现场指认,湖州市
本文利用图像经小波变换后系数具有能量主要集中在低频子带上和同方向高频小波子带之间具有相似性的特点,再结合人眼对高频失真不敏感的特性和分形算法对自相似的图像编码的
会议
为了进一步提高存储系统的存储速度,在分析单个SCSI直接存储系统数据传输过程的基础上,建立了缓冲并行预处理和SCSI直接存储阵列数据传输的理论模型.从理论和实验两个方面分
会议
BP神经网络可实现从输入到输出的任意非线性映射的特性.本文利用这一特性,用神经网络建立起图像中所选像素点与其邻域中其它像素点之间的关系模型.然后,根据被选像素与模型输
本文以田基黄高效液相色谱指纹图谱为研究对象,对四种常用的指纹图谱的相似度评价方法(夹角余弦法、相关系数法、距离法、改进的Nei系数法)进行了比较研究,先从定性的角度进
会议
Hyv(a)rinen等人提出的一种用独立分量分析方法去除图像噪声的方法,他所提出的方法的主要优势在于变换矩阵随含噪图像数据的变化而变化,但是在他的方法中,变换矩阵和收缩系数
随着国家对电力建设投资不断加大,电力设备需求的加大给变压器制造行业带来了新的机遇.但原材料价格上涨,又使变压器行业面临着巨大的挑战.抓住机遇,迎接挑战,关键在于质量,