J4 ›› 2009, Vol. 47 ›› Issue (4): 783-789.

Previous Articles     Next Articles

Implement of Keyexchange Based on the Hiddenbases viaErgodic Matrix over Finite Field

YUAN Zhe1, ZHAO Yongzhe1, LI Guangwei2, ZHANG Wenrui  |3,DI Chaosheng4, YANG Fan5, WANG Jun5   

  1. 1. College of Computer Science and Technology, Jilin University, Changchun 130012, China;2. AvePoint Technology Changchun |Co., Ltd, Changchun 130012, China;3. Jilin Filiale of Jilin Mobile Communication Co., Ltd, Jilin 132200, Jilin Province, China;4.
     Communication Construction Co., Ltd of Institute of Posts and Telecommunications of Changchun,Changchun 130012, China|5. Appliances of Motor Vehicle Service of Changchun, Changchun 130041, China
  • Received:2008-08-19 Online:2009-07-26 Published:2009-08-24
  • Contact: ZHAO Yongzhe E-mail:yongzhe@jlu.edu.cn.

Abstract:

Aiming at the poor security of traditional methods for keyexchange, we proposed a new method for keyexchange: the keyexchange based on hiddenbases. The bases selected by both parties are hidden by making use of ergodic matrix over finite field. Thus, this method realizes exchangeoperation and the keyexchange based on hiddenbases ultimately. Both the parties can do keyexchange on a relatively larger scale by making use of the protocol. Through the safety analysis of exchangeoperation, we found that the protocol can resist brute attack, and it is also of high security and strong practicability.

Key words: hiddenbase, keyexchange, exchangeoperation;  ergodic matrix over finite field

CLC Number: 

  • TP309