Các Giao TH C Xác TH C

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 103

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Mc lc LI NI U............................................................................8 Chng 3...................................................................................47 THIT LP KHA.................................................................47


1.L thuyt c bn...................................................................................47 1.1.Khi nim.......................................................................................47 1.2. ti ca kha v dn xut kha(key freshness v key derivation) ...................................................................................................................47

Danh mc cc k hiu vit tt


K hiu h AES MD4,MD5 SHA IV UCLN {M}K KXY N, NA TX sigA(M) Hm mt chiu Advanced Encryption Standard-Chun m ha tin tin Message-Digest algorithm : hm bm mt m Secure Hash Algorithm : thut gii bm an ton Gi tr ban u n bit c chung ln nht Bn m lp t M bng kha K Kha chia s gia X v Y Nonce-Thi khc TX : Tem thi gian c to bi thc th X. Ch k s trn M c to ra bi A M ha bng kha KAB Ni bit User
1

ngha

Chng 1

Alice,Bob,.. Tn thc th

K
|| U

AB

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

H Chng 2 ID PU f DES KEK KDC KDF KAB cnt KSES HMAC RQST eK A Chng 3 e1A K y MiTM PAKE CCDH Chng 4 S-PAKE S-3PAKE

Host nh danh Mt khu ca U Hm mt chiu cc k kh nghch nh Data Encryption Standard : Chun M ha D liu Key Encryption Key Key Distribution Center Key derivation function Kha chia s gia A v B Count : s m Kha phin Hash-based Message Authentication Code Request M ha s dng KA Gii m s dng KA Bn m thng ip Man in The Middle : tn cng ngi ng gia Password based Authenticated Key Exchange Chosen-base computational Diffie-Hellman Simple password based encrypted key exchange protocol Simple three-party key exchange protocol

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Danh mc hnh v
Hnh 1.1. Thut ton bm Matyas - Meyer - Oseas........................................12 Hnh 1.2. Thut ton bm Davies Meyer.....................................................13 Hnh 1.3.Thut ton bm Miyaguchi- Preneel................................................14 Hnh 1.4.M hnh to ch k s RSA.............................................................16 Hnh 1.5.Cc bc kim tra ch k s...........................................................16 Hnh 1.6.S ch k s khng cn b mt bn tin.......................................17 Hnh 1.7.S ch k s c b mt bn tin....................................................18 Hnh 1.8. S ch k s Elgamal................................................................20 Hnh 2.1. C ch thch -gii ..................................................................25 Hnh 2.2. Chun ha c ch thch -gii .................................................26 Hnh 2.3. C ch tem thi gian.......................................................................26 Hnh 2.4.S chun ha c ch tem thi gian..................................................27 Hnh 2.5. C ch phi chun............................................................................28 Hnh 2.6. Giao thc xc thc ln nhau ba bc s dng kho cng khai ISO...........................................................................29 Hnh 2.7.Tn cng Wiener..............................................................................30 Hnh 2.8. Giao thc Woo-Lam.......................................................................31 Hnh 2.9. Xc thc da trn mt khu............................................................32 Hnh 2.10. Giao thc xc thc s dng mt khu ca Needham....................34 Hnh 2.11. Trao i kho c lp m EKE.......................................................36
3

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 2.12.M t giao thc xc thc kho i xng Needham-Schroeder.......................................................................38 Hnh 2.13. Tn cng ln giao thc xc thc kho i xng Needham-Schroeder.......................................................................39 Hnh 2.14.M t giao thc xc thc kha cng khai Needhan-Schroeder........................................................................40 Hnh 2.15.Tn cng ln giao thc xc thc kha cng khai Needhan-Schroeder........................................................................42 Hnh 2.16.Tn cng phin song song.............................................................44 Hnh 2.17.Tn cng phn x...........................................................................45 Hnh 2.18. M t giao thc c xut bi Neuman v Stubblebine..........46 Hnh 2.19.Tn cng ln khim khuyt kiu....................................................46 Hnh 2.20.M t giao thc c xut bi Denning v Sacco....................47 Hnh 2.21..Bin th ca giao thc Otway-Rees..............................................48 Hnh 2.22. Tn cng ln bin th ca giao thc Otway-Rees........................48 Hnh 3.1.M hnh dn xut kha....................................................................51 Hnh 3.2.Kha trong h thng mng vi n=4 user.........................................52 Hnh 3.3.S thit lp kha s dng KDC..................................................53 Hnh 3.4.M hnh thit lp kha s dng KDC(bin th)..............................55 Hnh 3.5.Key Confirmation Attack................................................................56 Hnh 3.6.S trao i kha da trn giao thc Kerberos............................57 Hnh 3.7.Thut ton trao i kha Diffie-Hellman........................................60 Hnh 3.8.Tn cng MiTM ln thut ton Diffie-Hellman..............................61 Hnh 3.9.User t sinh kha,CA cp chng ch...............................................63 Hnh 3.10.CA sinh kha cho User..................................................................63 Hnh 3.11.Thut ton Diffie-Hellman vi chng ch.....................................64 Hnh 4.1.M hnh trao i kha da trn mt khu S-PAKE.........................67
4

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 4.2.M hnh S-3PAKE...........................................................................69 Hnh 4.3.Tn cng d mt khu ngoi tuyn(kch bn 1)..............................72 Hnh 4.4.M hnh tn cng d mt khu ngoi tuyn(kch bn 2).................74 Hnh 4.5.Tn cng gi mo thc th...............................................................77 Hnh 5.1.Chun b cc thng s......................................................................81 Hnh 5.2.Cc bn tham gia nhn thng s t file...........................................84 Hnh 5.2.Alice tnh A||X ................................................................................85 Hnh 5.4.Bob tnh A||X||B||Y..........................................................................86 Hnh 5.5.Server tnh X||Y.............................................................................88 Hnh.5.6.Bob tnh gxz v .............................................................................91 Hnh 5.7.Alice tnh gxz,kim tra v tnh ................................................93 Hnh 5.8. Bob kim tra ...............................................................................95 Hnh 5.9.To kha phin ................................................................................96 Hnh 5.10.M ha thng ip.........................................................................97 Hnh 5.11.Gii m thng ip.........................................................................99 Hnh 5.12.Lc tn cng don password ngoi tuyn............................101 Hnh 5.13.Thc hin d mt khu................................................................102

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

LI NI U
Ngy nay,khi cng ngh thng tin ngy cng pht trin,cng ngh mang n cho con ngi rt nhiu li ch nhng cng khng t nhng ri ro.Trong th gii ,con ngi lun hng chu nhng nguy c,ri ro an ton vi tn sut v mc cao. Mt m hc v nhng ng dng mt m hc c ng gp v cng quan trng cho mi ngi trong cuc chin vi nhng ri ro , giup cho nhng lin lc tr nn an ton v ng n trc nhng him nguy kh lng trc ca th gii o. Vi l do , n ny s tp trung nghin cu cc lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu-nhng ng dng mt m hc quan trng trong vic m bo an ton trong th gii o. Ni dung ca n bao gm Chng 1. Hm bm v ch k s : gii thiu nhng kin thc c bn tng quan ca hm bm,ch k s:hai trong s nhng ng dng mt m hc c s dng v cng rng ri. Chng 2.Giao thc xc thc : m t t tng quan n chi tit khi nim,phn loi v i su vo cc loi giao thc xc thc.Bn cnh l nhng tn cng in hnh ln cc giao thc xc thc. Chng 3.Thit lp kha : phn tch cc phng php trao i kha t mt m kha b mt n mt m kha cng khai.M t nhng ri ro,nguy c mt an ton ln cc giao thc trao i kha. Chng 4.Trao i kha ba bn da trn mt khu:i su vo phn tch lc trao i kha ba bn da trn mt khu,nhng ri ro c th c v nhng tn cng ln giao thc ny.

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Chng 5.Minh ha trn Maple:minh ha lc trao i kha ba bn da trn mt khu v tn cng ln giao thc ny thng qua cng c ton hc Maple Mc ch ca n: Nghin cu nhng giao thc xc thc t xa gia cc bn,nhng tn cng in hnh Nm r lc ,u nhc im,cc tn cng ca giao thc trao i kha ba bn da trn mt khu v a ra cc bin php ngn chn cc tn cng ny. Hiu v minh ha thnh cng giao thc trao i kha ba bn da trn mt khu v nhng tn cng ln giao thc qua cng c Maple

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Chng 1 HM BM,CH K S
I.Hm bm 1.Khi nim Cc hm bm ng vai tr c bn trong mt m hin i. Hm bm s to ra mt u ra t bn tin u vo. u ra ny c nh ngha l m bm (kt qu bm, gi tr bm). Ni mt cch chnh xc hn, hm bm h l mt nh x tnh ton hiu qu cc xu bit c di hu hn tu thnh cc xu bit c di n c nh.
R Hm bm h l mt nh x vi u ra c di n c nh h: D v | D| >|R| iu ny c ngha l khng th trnh khi cc va chm (tc l cng mt gi tr u ra c th c nhiu b gi tr vo khc nhau). Nu hm h l ngu nhin theo ngha tt c cc u ra l ng xc sut th c chng 2 t-n cc u vo nh x ti mi u ra (t: s bit u vo, n: s bit u ra, t > n) v 2 u vo c chn ngu nhin s c cng u ra vi xc sut 2 -n (khng ph thuc vo t).

tng c bn ca vic s dng cc hm bm trong mt m l s dng chng nh mt nh biu din rt gn (i khi cn c gi l vt, du tay s hay tm lc thng bo) ca mt xu vo v c th c dng nh th n chnh l xu vo . Cc hm bm c dng cho cc s ch k s kt hp vi vic m bo tnh ton vn ca d liu, khi bn tin trc ht c bm v ri gi tr bm (c xem nh i din cho bn tin) s c k thay cho v tr bn tin gc. Hm bm l mt hm h c t nht hai tnh cht sau: Tnh cht nn: h s nh x mt u vo x c di bit hu hn tu ti mt u ra h(x) c di bit n hu hn.
1.

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Tnh cht d dng tnh ton: Vi h cho trc v mt u vo x, c th d dng tnh c h(x).
2.

Gi s h l mt hm bm, x v x ' l cc u vo v y v y' l cc u ra. Ngoi hai tnh cht c bn trn ta cn cn n ba c tnh an ton ca hm bm: Tnh kh tnh ton nghch nh: i vi hu ht cc u ra c xc nh trc, khng c kh nng tnh ton tm mt u vo bt k m khi bm s cho ra u ra tng ng (Tc l tm mt nghch nh x ' sao cho
1.

h ( x ') = y vi y cho trc v khng bit u vo tng ng).

Kh tm nghch nh th hai: Khng c kh nng tnh ton tm mt u vo khc vi u vo cho trc (Tc l vi x cho trc phi tm x ' x
2.

) sao cho h ( x ) = h ( x ')


3.

vo khc nhau bt k x v x ' h ( x ) = h ( x ') . 2.Phn loi hm bm

Tnh khng va chm.Khng c kh nng v tnh ton tm hai u

C nhiu cch phn loi hm bm,nhng y ch cp n 2 loi ch yu l :


1.

Hm bm chuyn dng(Dedicated hash functions) : y l nhng thut ton c thit k c bit phc v mc ch ch yu l hm bm. Hm bm da trn m khi (Block cipher-based hash funions):chia thng ip u vo thnh cc block v s dng cc thut ton block cipher nh AES m nhn chc nng hm bm

2.

2.1.Cc hm bm chuyn dng (MD4 family) Hm bm chuyn dng l nhng hm c thit k c th ty chnh trong nhiu trng hp khc nhau.Trong ni bt nht l MD4,cc dng hm bm khc nh SHA,MD5...u c pht trin t MD4.MD4 c pht trin bi Ronald Rivest,s dng cc bin 32 bit,cc ton t logic nh AND,OR,XOR v NOT. K tip MD4 l MD5,c Rivest xut nm 1991,c 2 thut ton u cho ra bn tin tm lc u ra di 128 bits,tc l c kh nng trch xung t
9

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

l 264 . MD5 tr thnh thut ton c s dng cc k rng ri, v d nh, trong bo mt giao thc, tnh ton checksum cc tp tin hoc lu tr mt khu di dng bng bm. Sau MD5,US NIST cng b hm bm tip theo mang tn Secure Hash Algorithm (SHA) vo nm 1993,tip theo l SHA-1 vo nm 1995.C 2 u c sn phm u ra di 160 bits,khc bit ln nht l thut ton nn gia SHA v SHA-1. Nm 1996, mt cuc tn cng MD5 bi Hans Dobbertin khin cho cng nhiu cc chuyn gia khuyn co mi ngi s dng SHA-1 thay th cho MD5. 2.2. Hm bm da trn m khi (Hash Functions from Block Ciphers). Nh gii thiu,hm bm da vo m khi trc ht chia thng ip x thnh cc khi(block) c chiu di c nh,sau ty thuc vo lc bm m s dng chnh thng ip hoc bn bm ca khi trc lm kha m ha cho khi thng ip sau thng qua cc thut ton m khi.Ba thut ton bm sau y s gii thch r rng hn vn ny. 2.2.1. Thut ton bm Matyas - Meyer - Oseas. Vo: Xu bit x. Ra : M bm n bit ca x.
1.

u vo x c phn chia thnh cc khi n bit v c n nu cn

thit nhm to khi cui cng hon chnh. Ta c t khi n bit: x1 x 2 x t . Phi xc nh trc mt gi tr ban u n bit (k hiu IV).
2.

u ra l H t c xc nh nh sau:
i 1

H 0 = IV , H i = E g ( H ) ( x i ) x i , 1 i t

Hnh 1.1. Thut ton bm Matyas - Meyer - Oseas.


10

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Trong thut ton ny,thng ip x c chia thnh cc khi xi,cc khi xi ny l nhng khi c m ha qua b m ha E,bn m sau li c XOR ( ) vi chnh xi trc to ra bn tin tm lc u ra(bn bm) Hi.Hm bm trc Hi-1 c dng lm kha trong vic m ha bn tin xi bng vic i qua mt b g c tc dng chuyn i/n thm H i-1 c di ph hp vi di kha ca thut ton m ha khi.i vi block u tin,do cha c gi tr bm trc nn H0 s nhn gi tr hng s,gi tr ny c xc nh trc . 2.2.2.Thut ton bm Davies Meyer. Vo: Xu bit x. Ra : M bm n bit ca x. u vo x c phn thnh cc khi k bit (k l kch thc kho) v c n nu cn thit to khi cui cng hon chnh. Biu th thng bo
1.

n thnh t khi k bit: x1 x 2 x t . Xc nh trc mt gi tr ban u n bit (k hiu IV).


2.

u ra l H t c xc nh nh sau:
i

H0 = IV , H i = E x H i) 1 (

i 1 , 1 i t H

Hnh 1.2. Thut ton bm Davies Meyer. Thut ton ny tng t vi Matyas - Meyer Oseas tuy nhin vai tr x v H li o ngc so vi Matyas - Meyer - Oseas.Trong thut ton Davies Meyer,x c chia lm cc khi k bit v m nhn vai tr ca kha,trong khi bn tin bm trc Hi-1 l thng ip c a vo m ha,kt qu m ha s c XOR vi Hi-1 c bn bm Hi.
11

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

2.2.3.Thut ton bm Miyaguchi- Preneel. y l thut ton ci tin t thut ton Matyas - Meyer Oseas,thng ip x cng c chia thnh cc khi v l u vo thng ip c m ha,Hi-1 cng l kha cho qu trnh to bn m Hi.iu khc bit l bn m ca thng ip xi ngoi vic XOR vi xi cn XOR mt ln na vi Hi-1.

Hnh 1.3.Thut ton bm Miyaguchi- Preneel. Nh vy:


H 0 = IV , H i = E g ( H ) ( x i ) x i H i 1 , 1 i t
i 1

II.Ch k s 2.1.Khi nim ch k s Ch k s l mt trong nhng cng c mt m quan trng nht v ang ngy cng c s dng ph bin cng vi cc phng thc trao i kha trn ng truyn khng an ton. 2.2.Cc phng php to ch k s Chng ta hy so snh ch k thng v ch k s. Khi k ch k thng s din ra nh sau: Mi c nhn s dng cc c trng ring bit m ch ngi mi c (nt k, p lc t ln bt v.v). Vic gi mo ch k c pht hin nh php phn tch ho. Ch k v ti liu c k truyn i cng vi nhau trn cng mt t giy; truyn ch k ring r khi ti liu tuyt i khng c; ch k khng ph thuc vo ni dung ti liu c k.
12

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Cc bn sao ca cc ti liu c k khng c gi tr, nu nh mi bn sao khng c ch k tht (ch khng phi ch k sao). Khi k ch k s th thut ton nh sau: Mi c nhn s dng mt kho b mt ring ca mnh. Bt c no mun k ti liu m khng bit kho mt ring tng ng thc t s tht bi.

Ch k s ca ti liu l mt hm s ca ni dung ti liu v kho mt; ch k s c th truyn i tch bit khi ti liu. Mt bn sao ti liu vi ch k s khng phn bit so vi ti liu gc. 2.3.Mt s lc ch k s Ch k s c xy dng trn c s kt hp m ho kho cng khai vi hm bm. Tuy nhin cch s dng kha y khc vi trong cc h mt kha cng khai. Cc bc to ch k v kim tra ch k c m t trn hnh sau:

Hnh 1.4.M hnh to ch k s RSA


13

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 1.5.Cc bc kim tra ch k s 2.3.1.S ch k RSA Gi s n = p.q , trong p v q l cc s nguyn t ln c kch thc tng ng.
* K = {( n , e , d ) : d Z n , ed 1 mod ( n ) }

Vi K = ( n , e , d ) ta c D = d l kho b mt, E = ( n , e ) l kho cng khai, m l bn tin cn k. To ch k : S = sig D ( m ) = m d mod n Kim tra ch k: verE ( m , s ) = ng m Se mod n . Hot ng ca s ch k RSA c th m t nh sau: 2.3.1.1.Trng hp bn tin r m khng cn b mt. A k bn tin m v gi cho B. B kim tra ch k ca A.

Hnh 1.6.S ch k s khng cn b mt bn tin


14

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Gi s A mun gi cho B bn tin r m c xc thc bng ch k s ca mnh. Trc tin A tnh ch k s


SA = sig D ( m ) = m d mod n A
A A

Sau A gi cho B b i ( m , SA ) . B nhn c ( m , SA ) v kim tra xem


e iu kin m SA mod n A c tho mn khng. Nu tho mn, th khi B
A

khng nh rng verE ( m , SA ) nhn gi tr ng v chp nhn ch k ca A


A

trn m. V d A mun gi bn r c ch k s m=4 cho B: 1. Chn p = 3 v q = 11 2. Tnh n = p . q = 33 3. (n)=(3-1)(11-1)= 20 4. Chn e = 3 5. d = e-1 mod 20 = 7 mod 20 Vy kha cng khai l (n,e)=(33,3) Tnh ch k s Bn r m = 4: SA = md mod n = 47 mod 33= 16 mod 33 Vy thng ip cn gi l (m,SA)=(4,16) B kim tra ch k s ca thng ip A gi
e m SA mod nA =163 mod 33 = 4
A

Nh vy ch k s hp l 2.3.1.2.Trng hp bn tin r m cn gi b mt A k bn tin r m c ch k SA . Sau A dng kho m cng khai


E B ca B lp bn m M = E B ( m , SA ) ri gi n B. Khi nhn c bn m

M, B dng kho b mt D B ca mnh gii m cho M v thu c m , SA . Tip dng thut ton kim tra verE xc nhn ch k ca A.
A

15

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 1.7.S ch k s c b mt bn tin V d Cc bc thc hin mi bn Bn A 1.Chn pA=1123;qA=1223 2.Tnh nA=pA*qA= 1373429 3.Tnh 1371084 Bn B Chn pB=1231;qB = 1447 Tnh nB=pB*qB=1781257 Tnh 1778580

A(n)=(pA-1)(qA-1)=

B(n)=(pB-1)(qB-1)=

4.Chn eA = 1919 5.Tm dA= 545147 6.Public (nA,eA)=(1373429,1919) 7.Private (nB,dB)=(1373429,545147) key: key:

Chn eB= 5999 Tm dB= 1152119 Public key: (nB,eB)=(1781257,5999) Private 1152119) key: (nB,dB)=(1781257,

A v B trao i cc cp kha cng khai cho nhau Gi s thng ip A cn truyn l m=240988 A s tnh 1.SA=mdA mod nA=240988545147 mod 1373429 = 500724 2.Tnh X = m SA ; 3. M = X e mod n B =1599029||279545
B

16

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

V gi M cho B,khi B nhn c M,B s tnh 1. X = M


dB

mod n B =240988||500724

2. X = m S A .
e 3. m ' = S A mod nA m= 240988.
A

Kim tra thy m=m,vy thng ip c gi hp l 2.3.2.S ch k s Elgamal Thut ton Elgamal c m t nh sau To kha
a)
* To 1 s nguyn t p ln v mt phn t sinh g ca nhm nhn Z p

ca cc s nguyn mod p .
b) c)

Chn mt s nguyn ngu nhin a , 1 a p 2v tnh ga mod p Kho cng khai l b 3 s ( p,g,ga) , kho b mt l a .

Ch k s:
a) b) c)

Chn KE ngu nhin sau cho UCLN(KE,p-1)=1.


K Tnh r g mod p .
E

1 Tnh s (x a.r)KE mod p 1.

d) Ch k s l (r,s) Kim tra ch k s


a) b) c)

od Tnh t = (ga )r .r s m p .

Nu t =gx th ch k hp l. Nu t gx th ch k khng hp l.

17

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 1.8. S ch k s Elgamal

Chng 2 GIAO THC XC THC


I.Khi nim xc thc Giao thc l tp hp cc quy tc hoc tha thun nh r nh dng v truyn ti d liu m lm cho giao tip trn mng hiu qu hn Xc thc l mt hnh ng nhm thit lp hoc chng thc mt ci g (hoc mt ngi no ) ng tin cy, c ngha l, nhng li khai bo do ngi a ra hoc v vt l s tht Khi nim giao thc xc thc c th chia lm 3 khi nim con : xc thc ngun gc d liu,xc thc thc th v thit lp kha 1.Xc thc ngun gc d liu

18

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Khi nim xc thc ngun gc d liu d b nhm ln vi khi nim tan vn d liu(data integrity).Hai khi nim ny trong mt s trng hp thng b cho l mt,tuy nhin trn thc t l hai khi nim khc nhau: Th nht,xc thc ngun gc d liu cn thit n knh lin lc. l dch v an ton bn nhn thng bo c th kim tra xem bn gi c phi l bn c yu cu hay khng.Trong khi ,ton vn d liu khng cn n c tnh giao tip:dch v an ton c th c cung cp trn d liu c lu tr. Th hai l xc thc ngun gc d liu cn phi xc nh ngun gc ca thng ip c gi i trong khi ton vn d liu khng cn nh vy. Th ba l xc thc ngun gc d liu bao gm s thit lp tnh ti ca thng bo trong khi nguyn vn d liu li khng cn lm nh vy vy : Mt on c cng c th c tnh nguyn vn hon ho. t c dch v xc thc ngun gc d liu, thc th nhn thng bo nn kim tra xem thng bo c gi hin thi hay khng ( Tc l khong thi gian gia pht v thu thng bo l nh ). Nhn xt rng vn thng bo c ti hay khng cn c xc nh bi nhng ng dng. Mt s ng dng i hi khong thi gian ngn hn cho thng bo l ti l trong khong vi giy ( Nh trong nhiu thch -gii da trn nhng ng dng lin lc an ton thi gian thc ). Mt s ng dng cho php chu k ti di hn. T nhng tho lun trn chng ta c th c trng khi nim xc thc ngun gc d liu nh sau : a. Bao gm vic truyn thng bo t ngun c yu cu ( Thc th truyn ) n thc th nhn ni s kim tra tnh hp l ca thng bo sau khi nhn c. b. Kim tra tnh hp l ca thng bo c tin hnh bi thc th nhn nhm thit lp nh danh ca thc th truyn thng bo. c. Kim tra tnh hp l cng nhm thit lp tnh nguyn vn d liu ca thng bo theo sau s khi hnh ca n t thc th truyn.

19

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

d. Kim tra tnh hp l cn nhm thit lp tnh sng ca thc th truyn thng bo. 2.Xc thc thc th Xc thc thc th l mt qu trnh lin lc hay giao thc m qua n mt thc th thit lp s tng ng sng vi mt thc th khc v chng minh s bn thn l hp l. Mt s kiu xc thc thc th ph bin trong h thng phn tn : Kiu Host-Host : Nhng my tnh trong h thng phn tn c gi l node hay platform.Hot ng ti mc trm thng yu cu s hp tc trong chng. V d, trong vic khi ng t xa ca mt node, khi khi ng, node phi nhn bit trm ch tin cy cung cp thng tin cn thit nh l bn sao h iu hnh tin cy, thit lp ng h tin cy hay nhng thit lp mi trng tin cy hin hnh. S thit lp thng tin tin cy thng t c thng qua thc hin giao thc xc thc. Trng hp thng thng thuc kiu trm ti trm trong lin lc l thit lp client-server khi mt client yu cu nhng dch v no t server. Kiu User-Host : Ngi s dng t c truy cp n h thng my tnh bng cch ng nhp vo h thng. Nhng v d n gin nht l ng nhp vo my tnh thng qua TELNET hay tin hnh truyn tp thng qua FTP c hai c th t c thng qua thc hin giao thc xc thc mt khu. Kiu Process-Host : S pht trin mnh m ca cng ngh cho php thc hin nhng cng vic m trc y ch c trong vin tng. Mt trm c th cp cho cc tin trnh ngoi nhiu kiu quyn truy cp khc nhau. V d mt on m chng trnh di ng hay Java applet c th di chuyn n trm xa v thc hin trn trm nh mt tin trnh t xa. Trong nhng ng dng nhy cm cn phi thit k nhng c ch xc thc sao cho applet c th truy cp v cp quyn thch hp trn trm . Kiu Member-Club : Mt hi vin chng minh mnh c gi th hi vin ca cu lc b c th c xem nh s tng qut ho ca kiu ngi s dng ti trm. y cu lc b ch cn quan tm n kim tra tnh hp l ca th hi vin m khng cn thit phi bit thm thng tin chng hn nh nh danh ng ca hi vin.
20

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

3.Trao i kha da trn xc thc Thng th nhng bn lin lc thc hin cng vic giao thc xc thc thc th lm nn cho nhng lin lc an ton khc ti mc cao hn hoc ti mc ng dng nh vic trao i kha hay tho thun kho. Trong nhiu ti liu th nhng giao thc xc thc thc th, thit lp kho c xc thc, nhng giao thc tho thun kho, trao i kho, nhng giao thc an ton hay i khi thm ch l nhng giao thc mt m thng ni n cng mt tp ca nhng giao thc lin lc. Chi tit qu trnh trao i kha,trao i kha da trn xc thc s c trnh by k hn trong chng 3 ca n. 4.Tn cng trn giao thc xc thc Cho d mc ch cui cng ca qu trnh xc thc l xc thc ngun gc d liu,xc thc thc th hay trao i kha, nhng k thut mt m chc chn c s dng trong qu trnh ny. Tn cng ln giao thc xc thc bao gm k tn cng v lin minh ca chng ( gi chung l Malice ) t c mc ch en ti.iu ny c th l rt nghim trng chng hn Malice t c thng bo b mt hay kha hoc t nghim trng hn chng hn nh Malice la di thnh cng i vi mt thc th thit lp mt nim tin sai v mt tnh cht yu cu. Chng ta phi nhn mnh rng nhng tn cng ln nhng giao thc xc thc ch yu l nhng tn cng khng lin quan vi s ph v nhng thut ton mt m pha di. Thng l nhng giao thc xc thc l khng an ton khng phi do nhng thut ton mt m pha di m chng s dng m do nhng khim khuyt thit k giao thc cho php Malice ph v mc ch xc thc m khng cn phi ph v bt k thut ton mt m no. V l do trong phn tch nhng giao thc xc thc chng ta thng gi thit rng nhng thut ton mt m pha di l hon ho m khng cn xt n yu im c th c ca chng. Nhng yu im thng c xt n trong nhng ch khc ca mt m. II.Nhng k thut xc thc c bn :

21

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

C nhiu k thut khc nhau da trn giao thc hin thc ho xc thc v thit lp kho c xc thc nhng nhng kin thit giao thc c bn c bit l nhng kin thit tt li l thng nht. Nhng k thut xc thc c bn l : 1 Tnh ti ca thng bo v tnh sng ca thc th : Thng bo c ti hay khng l mt phn cn thit ca xc thc ngun gc d liu v c trong trng hp xc thc thc th khi thc th quan tm n s tng ng sng ca bn lin lc ch . Bi vy nhng c ch thit lp tnh ti ca thng bo v tnh sng ca thc th l nhng thnh phn c bn nht trong nhng giao thc xc thc. M t sau y l nhng c ch chun v c bn t c nhng chc nng ny. Trong nhng m t ny, Alice ng trn v tr ca ngi yu cu theo tnh cht ( V d l tnh kho ca Alice ta hay tnh ti ca thng bo ) v Bob ng trn v tr ca ngi kim tra theo tnh cht yu cu. Chng ta gi thuyt rng Alice v Bob chia s kho b mt K AB nu c ch s dng nhng k thut mt m i xng hoc Bob bit kho cng khai ca Alice thng qua chng ch kho cng khai nu c ch s dng nhng k thut mt m phi i xng. 1.1.C ch thch -gii (Challenge-Respone) Dng thng thng ca u vo ca Bob c th l s ngu nhin c gi l nonce c sinh ra bi Bob v truyn sang cho Alice trc . Gi s N B k hiu nonce sinh ra bi Bob. C ch lm ti thng bo ny c khun dng tng tc sau y :

Hnh 2.1. C ch thch -gii Thng bo c truyn trong bc mt thng gi l thch ca Bob i vi Alice v thng bo c truyn trong bc th hai gi l gii ca
22

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Alice i vi Bob. Bob trong v th ca ngi khi xng trong khi Alice trong v th ca ngi tr li. K thut c s dng trong c ch ny l k thut mt m i xng. Bi vy sau khi nhn c gii ca Alice,Bob phi gii m bn m s dng kho chia s KAB. Nu s gii m ly ra ng nonce ca anh ta th Bob c th kt lun rng Alice thc ra thc hin bin i mt m c yu cu sau hnh ng gi thch ca anh ta : Nu khong thi gian gia thch v gii l nh chp nhn c th thng bo M c coi l ti thc s. Bn cht ca c ch lm ti thng bo ny l m bo s bin i mt m ca Alice phi c thc hin sau khi Alice nhn c nonce ca Bob. l do nonce ca Bob c ly mu ngu nhin t mt khng gian ln v nh vy khng ai c th on trc c gi tr ca n trc khi anh ta gi n i. Nu thut ton lp m trong c ch xc thc trn khng cung cp dch v nguyn vn d liu ng n th Bob khng th thit lp c tnh ti ca thng bo M. 1.2.Chun ha c ch thch -gii . ISO v IEC chun ho ba c ch thch -gii c a ra hin nay i vi nhng c ch xc thc thc th n phng. S chun ho i vi c ch nghin cu trn c gi l giao thc xc thc n phng hai bc :

Hnh 2.2. Chun ha c ch thch -gii . Sau khi nhn c TokenAB Bob gii m n v +Chp nhn nu thy RB l nonce m Bob gi cho Alice. +T chi trong trng hp ngc li. Cc k hiu ca ISO/IEC c t giao thc bao gm :Text1, Text2 l nhng trng tu chn, du || k hiu ni xu bt, cn RB l nonce c sinh ra bi Bob.
23

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Chun trn l c ch xc thc thc th. Chnh v vy m n a vo thng bo B chnh l nh danh ca Bob thay cho thng bo M l cc k quan trng. Trong giao thc ny Bob l ch th xc thc v do vy m c mc ch thit lp s tng ng sng ca Bob. 1.3.C ch tem thi gian(Time Stamp). Trong c ch tem thi gian Alice thm thi gian hin ti vo thng bo ca mnh. Gi s TA l k hiu tem thi gian c to ra bi Alice khi Alice to ra thng bo ca Alice. C ch lm ti thng bo ny c khun dng khng tng tc sau y:

Hnh 2.3. C ch tem thi gian. Qu trnh gii m c thc hin bi Bob cng cn c kim tra i vi s ng n ca tnh nguyn vn d liu. Sau khi gii m Bob c th so snh TA nhn c vi thi gian ca chnh anh ta vi gi thit rng nhng ngi tham gia giao thc s dng thi gian chun ton cu nh GMT chng hn. Nu s khc nhau v thi gian nh cho php bi ng dng trong suy ngh ca Bob th thng bo M dng nh l ti. Tem thi gian trnh c s cn thit phi tng tc v v vy thch hp cho nhng ng dng lin quan n khng tng tc v d nh trong nhng ng dng th in t. S bt tin ca c ch tem thi gian l vic ng b ho ng h thi gian cn c i hi v phi c duy tr an ton,trn thc t iu ny rt kh khn. Trong kin thit giao thc c bn nonce v tem thi gian l nhng thnh phn c bit ca thng bo. Chng ng vai tr nhn bit tnh ti ca nhng thng bo khc c tch hp mt m vi chng. 1.4.S chun ha c ch tem thi gian. ISO/IEC cng chun ho nhng c ch tem thi gian i vi nhng giao thc xc thc. S chun ho ISO/IEC i vi c ch nu trn c gi
24

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

l Giao thc xc thc n phng mt bc ISO kho i xng v l nh sau y :

Hnh 2.4.S chun ha c ch tem thi gian y


TA NA

k hiu s la chn gia s dng TA l tem thi gian v NA l s

tun t(sequence number) . C ch s tun t cng c hai nhc im. Th nht mt tp thng tin trng thi cn phi c duy tr i vi mi bn lin lc. iu ny l kh i vi nhng ng dng trong mi trng m trong khi mi thc th c th lin lc vi nhiu thc th khc. Bi vy c ch s tun t khng th phn tch cng vic tt c. Th hai qun l ni lu gi s tun t c th l rt rc ri trong s c mt ca nhng sai st lin lc, hoc ngu nhin hoc ch nh l tn cng t chi dch v chng hn. Chng ta nh li rng giao thc xc thc nn l phi trng thi : Mt giao thc c trng thi khng th vn hnh ng n trong mi trng th ch. Chnh v vy m c ch s tun t khng c khuyn co s dng mc d nhng c ch nh vy c chun ho theo chun ISO/IEC. 1.5.C ch phi chun T nhng c ch trn c th d dng xy dng mt bin th,v d nh

Hnh 2.5. C ch phi chun y l loi c ch lp m ri li gii m ca thc th nhn bit tnh ti. Thc hin c ch ny s cung cp phng cch kim tra tnh hp l ca s tng ng sng ca bn lin lc c ch nh. C ch ny khng

25

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

ph hp xy dng nhng giao thc xc thc. Trong c ch ny Alice c th tnh c lm l thng tin cn gi kn. Malice c th ghi li bn m t cuc trao i kn gia Alice v Bob v chn n vo trong giao thc s dng c ch lp m ri sau li gii m . Do c ch lp m ri li gii m khng c ISO/IEC xem xt trong qu trnh chun ha. Tuy nhin c nhiu giao thc xc thc c thit k s dng c ch lp m ri li gii m. V vic s dng nhng c ch khng chun nh vy l nguyn nhn chnh ca nhng khim khuyt an ton trong nhng giao thc ny. 2.Xc thc ln nhau Nhng c ch c bn i vi tnh ti ca thng bo v tnh sng ca thc th a ra hin t c ci gi l xc thc n phng c ngha l ch c mt trong hai thc th tham gia vo giao thc l c xc thc. Trong xc thc ln nhau c hai thc th lin lc u c xc thc nhau. Ngi ta c th coi xc thc ln nhau ch n gin l hai xc thc n phng. Tc l xc thc ln nhau c th t c bng cch p dng mt trong nhng giao thc xc thc n phng c bn hai ln hai hng ngc nhau m thi. Nhng trn thc t quan nim ny l khng chnh xc. Quan h tinh t gia xc thc ln nhau v xc thc mt pha khng c hiu r rng t trong giai on sm ca qu trnh chun ho ISO/IEC i vi giao thc di y. Giao thc : Giao thc xc thc ln nhau ba bc s dng kho cng khai ISO. Gi thit : A c chng ch kho cng khai CertA;

B c chng ch kho cng khai CertB; Mc ch : H t c s xc thc ln nhau.

26

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 2.6. Giao thc xc thc ln nhau ba bc s dng kho cng khai ISO. Trong : TokenAB = RA || RB || B || sigA(RA || RB || B);

TokenBA = RB || RA || A || sigB(RB || RA || A). Tn cng ca Wiener : Tn cng ny cn c gi l tn cng Canada do c khm ph ra bi c quan thnh vin Canada ca ISO.

Hnh 2.7.Tn cng Wiener Cc bc tn cng


1

Malice gi mo Bob gi cho Alice RB.

27

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Alice nhn c thng ip,gi li cho Malice : CertA, RA || RB || B || sigA(RA || RB || B ).


2 a) b)

Malice tin hnh tch ly RA v gi n cho Bob. B nhn c RA tin hnh gi li cho Malice CertB, R B || RA || A || sigB(RB || RA || A)

3 Malice chuyn tip thng ip ca Bob cho Alice m khng thay i thnh phn no trong thng ip. Kt qu l Alice ngh rng Bob khi to phin lin lc trong khi ngi khi to tht s l Malice Ta c th thy gi tr RB do Malice v Bob gi l khc nhau.Do giao thc trn c mt cch khc phc hiu qu. l A phi duy tr trng thi ph hp vi nonce RB ca B n khi phin lin lc hin hnh kt thc. 3 Xc thc lin quan n bn th ba tin cy : Trong qu trnh xc thc,chng ta gi thit rng hai bn tham gia giao thc hoc l chia s knh truyn an ton trong trng hp nhng kin thit s dng nhng k thut mt m i xng hoc bit kho cng khai ca bn kia trong trng hp nhng kin thit s dng nhng k thut mt m phi i xng.iu ny c mc ch lm ti knh an ton gia cc bn bng cch khng nh li s tng ng sng gia h vi nhau. Nu hai thc th khng bit nhau mun tin hnh lin lc an ton th u tin phi thit lp knh an ton. Knh an ton c cng c bi kho mt m. Bi vy hai thc th mun thit lp knh an ton vi nhau th thc hin giao c gi l giao thc thit lp kho c xc thc. Sau khi kt thc phin lin lc an ton hai thc th s nhanh chng vt b knh ny. Tc l h qun i kho s dng trong knh v khng bao gi s dng n na. Chnh v vy m knh an ton ny gi l knh phin v kho cng c n gi l kho phin. Kin trc chun cho cc thc th thc hin xc thc v nhng giao thc thit lp kho trong h thng m l s dng dch v xc thc tp trung t bn th ba tin cy. Dch v nh vy c th l trc tuyn hoc ngoi tuyn. C hai chun ISO/IEC i vi cc giao thc xc thc bn th ba tin cy. Mt ci c tn giao thc xc thc bn bc ISO v mt ci c tn
28

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

giao thc xc thc nm bc ISO. Hai giao thc ny t c xc thc thc th hai pha v thit lp kho phin c xc thc. Giao thc Woo-Lam : Mc ch ca giao thc ny l Alice xc thc mnh i vi Bob thm ch khi hai thc th ban u cn cha bit nhau.

Hnh 2.8. Giao thc Woo-Lam. M t: 1 Alice gi cho Bob nh danh ca mnh yu cu xc thc vi Bob.
2 3 4

Bob sinh ra mt nonce NB v gi cho Alice. Alice m ha NB bng kha KAT chia s vi Trent : { N B } K AT . Bob gi bn m bao gm nh danh Alice v { N B } K AT Alice gi cho

bc ba cho Trent.Thng ip c m ha bng kha KBT chia s vi Trent. Trent da vo hai kha KBT v KAT ln lt gii m hai ln bn m thu c NB.Sau m ha NB bng KBT v gi li cho Bob.
5

Bob gii m thng ip t Trent,so snh NB c c t thng ip vi NB mnh sinh ra v :


6 a)

Chp nhn Alice xc thc ng nu NB ng l mnh sinh ra.

b) T chi trong trng hp ngc li. 4.Xc thc da trn mt khu :

29

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Xc thc da trn mt khu l hnh thc xc thc ph bin nht trong m hnh xc thc t xa gia user v host. dng xc thc ny user v host chia s mt khu. Ngi s dng U mun s dng dch v ca trm H th u tin phi c khi hot bi H v c cp pht mt khu. H lu tr mt kho mt khu ca tt c ngi s dng. Mi mc ca kho lu tr mt khu l mt cp (IDU,PU) vi IDU l nh danh ca U cn PU l mt khu tng ng ca U.

Hnh 2.9. Xc thc da trn mt khu Giao thc da trn mt khu c trnh by nh sau :
1. 2.

Khi User U mun ng nhp vo Host H,U gi cho H bn tin IDU.. H nhn c yu cu ca U,gi li bn tin yu cu U cung cp mt khu cho nh danh IDU. U gi cho H mt khu ca mnh (tng ng vi nh danh IDU ). H tm cp (IDU,PU) t trong kho lu tr v :
a.

3. 4.

Chp nhn nu thy c cp trng vi (IDU,PU) trong kho.

b. T chi trong trng hp ngc li. Cn phi lu rng giao thc ny tht ra khng phi l xc thc thc th cng khng phi l xc thc mt pha t U n H v khng c phn no ca giao thc ng n nhn bit tnh ti i vi nhn bit tng ng sng ca U. Giao thc ny gp phi hai vn nghim trng: 1. Th nht l kh nng tn thng i ca tp mt khu lu gi trong H. Tp ny c th b c bi Malice. Vi tp mt khu,Malice c th t c tt c quyn ca tt c nhng ngi s dng. Anh ta c th ng gi bt k ngi s dng no v di v bc tn ngi khc,nguy c b pht hin l rt thp.
30

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

2. Th hai l i vi giao thc truy cp t xa da trn mt khu lm cho mt khu i t U n H di dng bn r bi vy n c th b Malice nghe trm. y l kiu tn cng nghe trm mt khu trc tuyn. 4.1 Giao thc mt khu Needham v vic trin khai trong h iu hnh UNIX: Needham c sng kin a ra phng php hiu qu v n gin ng ngc nhin khc phc lu tr an ton mt khu ti my trm. Trm H nn s dng hm mt chiu lp m mt khu tc l mc (IDU,PU) nn c thay bng (IDU, f(PU)) f l hm mt chiu cc k kh nghch o.

Hnh 2.10. Giao thc xc thc s dng mt khu ca Needham. y l s xc thc s dng mt khu c ci t cho h iu hnh UNIX. Hm f c ci t s dng thut ton lp m DES. Bng cch ny bin i f(PU) s dng DES c th c coi l hm bm mt chiu c kho,kho l PU cn tham s l salt. Nh c salt mc mt khu lu tr trong tp mt khu trong H s l (IDU,salt,f(PU,salt)). Mc d tnh b mt ca tp mt khu c m bo v c lp m nhng tnh nguyn vn d liu vn phi c duy tr. Tuy vy mt khu vn c th b nghe trm trc tuyn v vy m mt khu s dng mt ln c xut chng li tn cng dng ny. 4.2 S mt khu s dng mt ln : Lamport xut tng n gin cn ph nghe trm mt khu trc tuyn. K thut ny c th c coi l s mt khu mt ln. Mt ln c
31

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

ngha l nhng mt khu c truyn t U n H khng lp li tuy nhin chng c quan h tnh ton vi nhau. By gi th mt mt khu b nghe trm s khng th s dng li v vn nghe trm mt khu c ngn nga thnh cng. Trong thi gian khi hot ca ngi s dng mc mt khu ca U c thit lp l (IDU, fn(PU))

f n (PU ) = f (...(f (PU ))...) {


n

def

Vi n l s nguyn ln. Ngi s dng U s ch phi nh PU trong trng hp giao thc xc thc mt khu. Khi U v H thc hin xc thc mt khu ln u ti, sau li nhc Mt khu(ti bc th 2 trong m hnh 2.9),mt thit b tnh ton ca U s yu cu U nhp kho PU vo v sau tnh fn-1(PU) bng cch p dng lp li f ng n-1 ln. iu ny c th hiu qu khi n ln chng hn n = 1000. Kt qu s c gi cho H nh thng bo ti bc th ba trong m hnh 2.9 Khi nhn c fn-1(PU) th H ch vic p dng f mt ln na trn mt khu nhn c t c fn(PU) v thc hin kim tra tnh ng n nh trong bc t ca m hnh 2.9. Ngoi ra H cn cp nht mc mt khu ca U bng cch thay th fn(PU) bng fn-1(PU). Giao thc ny l c trng thi vi con m gim dn t n n 1. Khi con m t n 1 th U v H phi ti thit lp mt khu mi cho U. Do m ng b con m mt khu gia U v H lun phi c duy tr. 4.3 Thm Salt vo trong giao thc xc thc : a s nhng h thng da trn mt khu khuyn ngi s dng chn mt khu ca h sao cho chng nn c 8 k t . Mt khu c di nh vy c th nh c bi a s ngi s dng m khng cn phi vit ra giy. V cc k t ASCII c biu din bng mt byte gm 8 bt nn mt khu 8 k t s tng ng vi xu 64 bt. Khng gian ca nhng xu 64 bt c 264 kh nng v nh vy l ln chng li c vic on mt khu hoc thm ch nhng tn cng duyt t ng.
32

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Mc d vy ngi s dng thng chn mt khu cho d nh nh l tn ngi thn,ngi yu,sinh nht,nhng t trong t in, tn ngi s dng tt c u l ch thng,hoc c th thm vo cui mt hai ch s. Do khng gian mt khu nh hn 264 rt nhiu v l i tng cho tn cng t in ngoi tuyn. Malice s s dng f(PU),d tm trong t in tm c mt khu trng khp vi PU. Thc hin ngoi tuyn s t ng v nhanh hn so vi trc tuyn. S mt khu mt ln ca Lamport cng khng th chng li c tn cng t in ngoi tuyn: Malice c th nghe trm gi tr trng thi hin hnh i v fi(PU) v t c th tin hnh duyt tm t in. Bellovin v Merritt xut mt giao thc mi c tn l Trao i kho c lp m (Encrypted Key Exchange- hay vit tt l EKE ). Giao thc ny bo v mt khu chng li c nhng tn cng nghe trm trc tuyn v t in ngoi tuyn. K thut s dng l lp m xc sut c bn.

Hnh 2.11. Trao i kho c lp m EKE.


33

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Trong bc mt bn m PU( U ) l kt qu ca vic lp m mt on thng tin ngu nhin v mt ln

U s dng kho P . Trong bc hai ni


U

dung c lp m hai ln trong bn m PU ( U (K)) vi K l kha phin. Tnh ngu nhin mt ln ca

U ng vai tr ca mo salt. Nu kho

cng khai khng l mt ln th chc nng duy nht ca giao thc EKE s tht bi hon ton : Thm ch c th d dng cho Malice tm kim mt khu PU s dng yu im ca thut ton mt m kho cng khai chng hn tn cng gp nhau gia. Nu nhng nonce NU, NH c lp m trong thng bo dng 3,4,5 c sinh ra ngu nhin v c kch c ln ph hp chng hn ln hn so vi kho phin K th chng che giu tip c kho phin K bng cng mt cch nh i vi mt khu PU c che giu trong hai thng bo u. Do m PU vn cn l c lp thng k i vi bt k thng bo no i qua trong giao thc EKE. S c lp thng k ca mt khu PU i vi nhng thng bo i qua trong chuyn giao thc c ngha l mt khu c che giu khi k nghe trm theo ngha an ton l thuyt thng tin. V bn cht l salt thm vo mt khu khuych i kch c ca khng gian mt khu t kch c t in ln n kch c kho phi i xng ngu nhin. chnh l mo ng sau giao thc EKE. 5.Tn cng trn giao thc xc thc 5.1.Tn cng pht li(Replay Attack) Trong tn cng pht li Malice c mt thng bo c thng bo ny c Malice ghi li t phin lin lc trc ca giao thc.Malice s tin hnh pht li thng bo ny trong phin lin lc mi.

34

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 2.12.M t giao thc xc thc kho i xng Needham-Schroeder.

35

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 2.13. Tn cng ln giao thc xc thc kho i xng NeedhamSchroeder Trong tn cng trn,Malice thay th thng ip m Alice gi c trong bc 3 bng thng ip c m Malice ghi li khi Alice v Bob trao i vi nhau rong qu kh.Thng ip c c Malice gi li cho Bob ti bc 3,tt nhin cng thng ip ny,Malice cng bit kha phin trc K. Ti bc 4,Bob nhn c thng ip ca Malice ,tin hnh gii m v thu c kha phin c K.Bob theo thut ton,cng sinh NB,sau m ha bng K,gi thng ip cho Malice thch .Tuy nhin,do s dng kha K,m Malice bit kha ny nn s thch ny tr nn v dng,Malice
36

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

hon ton vt qua c thch v thit lp thnh cng phin lin lc gia mnh v Bob trong khi Bob lun ngh rng l Alice 5.2.Tn cng ngi ng gia(Man-in-The-Middle-MiTM) Tn cng trn giao thc xc thc kha cng khai Needhan-Schroeder : 5.2.1.M t giao thc

Hnh 2.14.M t giao thc xc thc kha cng khai Needhan-Schroeder


1) 2)

Alice --> Trent : A, B yu cu kha cng khai ca Bob . Trent-->Alice :{K pubB , B}K
priT

, trong c kha cng khai ca

Bob c m ha bng kha b mt ca Trent(ch k s) m bo thng ip ny ng l ca Trent gi i .


3)

Alice --> Bob

:{N A , A}K

pubB

; Alice sinh ra mt Nonce NA v

gi cho Bob,thng ip c m ha bng kha cng khai ca Bob.


4)

Bob --> Trent

: B, A :

Sau khi nhn c thng ip ca

Alice,Bob gii m thng ip ly NA ,ng thi yu cu ln Trent ly kha cng khai ca Alice
37

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

5)

Trent --> Bob :{K pubA , A} K

priT

;tng t bc 2,Trent gi cho

Bob thng ip cha kha cng khai ca Alice v k ln thng ip .


6)

Bob --> Alice :{N A , N B }KpubA ; Bob gi thng ip bao gm NA chng minh mnh vi Alice,NB yu cu Alice xc thc ngc li.Thng ip c m ha bng kha cng khai ca Alice

7)

Alice --> Bob

:{N B } K pubB ;Sau khi nhn c thng ip bc

6,Alice gii m thu c NA v NB .Sau Alice kim tra NA c ng l NA do mnh to ra khng.Nu ng,gi thng ip cha NB cho Bob xc thc mnh vi Bob,thng ip c m ha bng kha cng khai ca Bob. Bob nhn c thng ip ,gii m n v kim tra.Nu NB chnh xc,qu trnh xc thc gia Bob v Alice hon tt.C hai s bt u trao i d liu vi nhau an ton. 5.2.2.Tn cng ln giao thc Trong kch bn tn cng ln giao thc xc thc kha cng khai NeedhanSchroeder,ta gi s k tn cng M(Malice) trong cng h thng vi A v B,M c th thit lp mt phin hp l vi c A v B(tt nhin l vi nh danh ca M) v M c gi nng gi dng A thit lp mt knh phi php vi B.Kch bn tn cng chia lm hai giai on +Giai on 1: A thit lp mt knh hp l vi M +Giai on 2: M gi dng A thit lp knh vi B M hnh cuc tn cng nh sau

38

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 2.15.Tn cng ln giao thc xc thc kha cng khai NeedhanSchroeder M t
1)

Alice --> Malice : {N A , A}K

pubM

;Alice thit lp mt phin hp

l vi Malice,thng ip ca Alice bao gm Nonce do Alice sinh ra,nh danh ca Alice.Thng ip c m ha bng kha cng khai ca Malice.
2)

Malie --> Bob :{N A , A}K

pubB

;Malice ng gi Alice,c gng

thit lp phin vi Bob vi nh danh A,Nonce ca A ly c t bc 1.


3)

Bob --> Malice :{N A , N B }K pubA ; Bob gii m thng ip th 2 v ngh l phin do Alice khi to.Bob gi thng ip gm NA v NB do Bob sinh ra v Alice gi.Thng ip c m ha bng kha cng khai ca Alice.

4)

Malice --> Alice :{N A , N B }K pubA ;Malice n gin gi nguyn thng ip ca Bob v cho Alice.

39

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

5)

Alice --> Malice :{N B }K pubM ; Alice gii m thu c NA v NB .Sau Alice kim tra NA c ng l NA do mnh to ra khng.Nu ng,gi thng ip cha NB xc thc,thng ip c m ha bng kha cng khai ca Malice

6)

Malice --> Bob : {N B }K pubB ;Malice gii m thng ip th 5

ly c NB,sau li m ha NB bng kha cng khai ca Bob v gi cho Bob. Sau khi cc bc hon tt,Bob tng rng mnh ang lin lc vi Alice m khng ng rng c k ang gi dng Alice.V khi hon ton Malice c th gi dng Alice send cho Bob mt thng ip nh : {NA,NB, " Chuyn cho mnh $10.000 " }

K pubB

chng li tn cng dng ny,ch cn thao tc n gin thm nh danh ngi gi trong bc 6 ca giao thc : 2.6. Bob --> Alice :{B, N A , N B }KpubA Khi gi tin tn cng s tr thnh 2.6 : {B, N A , N B }K pubA ;v k tn cng khng th pht li gi tin ny do Alice ang mong ch gi tin vi nh danh Malice 5.3.Tn cng phin song song Tn cng phin song song l tn cng m hai hay nhiu yu cu thit lp phin cng c gi n mt thc th,tuy nhin tt c yu cu u c "o din" bi Malice

40

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 2.16.Tn cng phin song song Trong m hnh trn Malice to ra hai yu cu lin kt ti Bob,mt yu cu vi nh danh chnh bn thn v mt yu cu vi nh danh gi mo Alice.Khi ti bc 2 v 2,Bob sinh ra hai nonce NB v NB gi cho hai yu cu,tuy nhin ch v thc s ch l mt ngi. im mu cht ca cuc tn cng l ti bc 3 v 3,khi Malice thay v phi m ha NB v NB th Malice ch m ha NB vi kha KMT chia s vi Trent.Sau ,Malice gi thng ip ny hai ln vi hai nh danh khc nhau(Alice v Malcie) cho Bob.Bob s gi hai thng ip cng ni dung ny cho Trent. im tip theo cn lu l ti bc 4 v 4.Ti y,sau khi gii m lp m ha u tin ca hai thng ip bng kha KBT,Trent thu c hai thng ip +Alice,{NB}KMT (1)

+Malice,{NB}KMT (2)
41

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Cho rng thng ip (1) ca Alice,nn Trent s gii m bng kha KAT kha c chia s gia Alice v Trent.Tuy nhin,thng ip ny li c m ha bi KMT nn Trent khng th gii m thng ip ny hoc gii m ra gi tr gi l "rc".Thng ip th (2) c gii m mt cch bnh thng v trent c c NB. Trent s m ha NB v "rc" trong hai thng ip khc nhau bng kha KBT v gi li cho Bob ti bc 5 v 5. Bob s tin hnh gii m hai thng ip thu c NB v "rc".Nhn thy ch c NB gi cho Alice m khng c gi tr NB gi cho Malice,Bob t chi phin lin lc hp l vi Malice v chp nhn phin lm vic vi Mailice(Alice) m khng bit rng thc ra vn l Malice. 5.4.Tn cng phn x (Reflection Attack) Trong tn cng phn x khi mt ch th A gi thng ip yu cu thit lp mt lin lc th Malice chn ly thng bo v n gin gi n ngc tr li cho thc th A.

Hnh 2.17.Tn cng phn x Trong m hnh trn,Malice phn x gi tin trong bc 2 v bc 4 truyn li chi Bob.iu ny lm cho Bob cho rng Alice ang tham gia vo phin lin lc nhng thc cht,Alice khng h c mt trong cuc lin lc ny. 5.5.Tn cng da trn khim khuyt kiu Nhng khim khuyt in hnh bao gm vic thc th b la din dch sai mt nonce, tem thi gian hay nh danh thnh kho chng hn. Chng ta
42

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

ly giao thc c xut bi Neuman v Stubblebine minh ho tn cng khim khuyt

Hnh 2.18. M t giao thc c xut bi Neuman v Stubblebine M t giao thc ny nh sau 1.Alice gi cho Bob gi tin vi nh danh ca mnh v mt s nonce NA 2.Bob nhn c gi tin t Alice,to thng ip th 2 { A,N A ,TB} K BT , NB v gi thng ip ny n server Trent. 3.Trent gii m thng ip ca Bob bng KBT.Tin hnh to kha phin KAB v gi { B, N A , K AB , TB} K AT, { A, K AB , TB} K BT , NB cho Alice 4.Alice gii m { B, N A , K AB , TB} K ATbng kha KAT thu c KAB,xc minh li NA v gi { A, K AB ,TB} K BT , { N B } K AB cho Bob. 5.Bob tin hanh gii m thu c KAB v xc minh NB Giao thc ny ch cho Alice v Bob t c xc thc ln nhau v thit lp kho c xc thc bng cch s dng dch v tin cy ca Trent. Nu nonce v kho KAB l nhng s ngu nhin c cng kch c th giao thc ny cho php Malice dng ln tn cng khim khuyt .

Hnh 2.19.Tn cng ln khim khuyt kiu Trong tn cng ny Malice s dng nonce NA thay cho kho phin KAB v Bob c th b la chp thun n. Trn thc t khng c c ch tt ngn tn cng ny xy ra.
43

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

5.6.Tn cng do b st tn : Trong nhng giao thc xc thc thng th tn lin quan vi thng bo c th c suy ra t nhng phn d liu khc. Tuy vy khi thng tin ny khng th suy ra c th vic b st tn l sai lm hu qu l rt nghim trng. Denning v Sacco xut mt giao thc nh mt phin bn kha cng khai sa cha nhng nguy c ca giao thc xc thc kho i xng Needham-Schroeder.

Hnh 2.20.M t giao thc c xut bi Denning v Sacco Trong giao thc ny thng bo th ba c lp m cho c b mt v xc thc. Thng ip c m ha bi kha cng khai ca Bob v c k bi kha ca Alice.Do Bob tin tng kha phin KAB l kha ch Alice v Bob bit. Tic thay khng c g m bo cho tnh cht chia s kho ch gia hai ngi. Abadi v Needham khm ph mt tn cng n gin nhng gy ra sc. l Bob sau khi nhn c thng bo t Alice c th la thc th khc tin vo tnh cht ny : 3. Bob(Alice) Charlie : CertA, CertC, { sig A (K AB , TA )} K C; Charlie s tin rng thng bo n t Alice v c th tip sau gi thng bo kn cho Alice,thng bo ny c m ha bng kho phin KAB. Nhng Bob li c th c c n. V vy cch hin nhin c t iu ny trong giao thc nn l : 3. Alice Bob : CertA, CertB, { sig A (A, B, K AB , TA )} K B 5.7.Tn cng do s dng sai cc dch v mt m : l thut ton mt m c s dng trong giao thc cung cp s bo v khng ng n ni s bo v cn thit li khng c mt. C nhiu tn cng khc nhau nhng in hnh l hai kiu sau :
44

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

i) ii) ngha.

Tn cng do khng c bo v nguyn vn d liu : Tnh b mt khng t c do vng mt s bo v an ton ng

Hnh 2.21..Bin th ca giao thc Otway-Rees Bin th y l ti bc 2 c s tch ring cc khc bn m ca Bob s dng kho KBT i vi thi khc NB v thng bo M v nh danh Alice, Bob. Bn m trong giao thc nguyn thu Otway-Rees l :

{N

, M, Alice, Bob} K BT.

Hnh 2.22. Tn cng ln bin th ca giao thc Otway-Rees


1. 2.
B

Malice(Alice) Bob : M, Alice, Bob, ; Bob Malice(Trent) : M, Alice, Bob, { N M , M, Malice, Bob} K MT,
BT

{ N } K , { M, Alice, Bob}

KBT ;

45

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

2'.
M

Malice(Bob)
MT B

BT

Trent

M,

Malice,
BT

Bob,

{ N , M, Malice, Bob} K ,{ N } K , { M, Malice, Bob} K { M, Malice, Bob} K l bn m Malice gi cho Bob trc ;
BT

: Trong

3. 4.

Trent Bob : M, { N M , K MB} K MT, { N B , K MB} K BT ; Bob Malice(Alice) : M, { N M , K MB} K MT.

Hu qu : Bob tin rng anh ta ang ni chuyn vi Alice v chia s kho phin vi Alice. Tuy nhin thc ra anh ta ang ni chuyn vi malice v chia s kho phin vi Malice. Trong tn cng ny Malice ng gi lm Alice v khi hot phin lin lc vi Bob. Malice sau cp ly thng bo t Bob n Trent ti bc 2 v thay nh danh ca Alice thnh nh danh ca mnh : thay bn m th hai ca Bob { M, Alice, Bob} KBT bng bn m c { M, Malice, Bob} KBT m Malice gi cho Bob trc . Sau khi gi i cc thng bo sa i n Trent bng cch ng gi l Bob ti bc 2 mi th s hon ton tt p vi Trent v Bob. Trent ngh rng hai khch hng ngi s dng yu cu dch v xc thc l Malice v Bob trong khi Bob li ngh rng chuyn lin lc l gia Alice v anh ta. Bob s s dng kho phin c thit lp m anh ta ngh l chia s vi Alice nhng thc ra l vi Malice v s gi cho Malice nhng thng bo cn gi kn ng ra c gi cho Alice. Dch v ng n l nguyn vn d liu phi c cung cp tch hp thi khc v nh danh thc th l NB v Alice, Bob. NB thc ra c th gi i di dng bn r nu bo v tnh nguyn vn ng n c thc hin. Khng c bo v tnh nguyn vn m li lp m NB l thiu st hon ton.

46

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Chng 3. THIT LP KHA


1.L thuyt c bn 1.1.Khi nim Qu trnh thit lp kha dng chung gia cc bn tham gia c chia l 2 loi +Key transport(chuyn ti kha) : mt bn th 3 tin cy s lm nhim v to kha v phn phi kha cho cc bn tham gia +Key aggrement(tha thun kha): mi bn tham gia s phi to kha,trao i vi nhau 1.2. ti ca kha v dn xut kha(key freshness v key derivation) Trong rt nhiu h thng an ninh ,kha mt m c s dng ch trong mt khong thi gian ngn.Nhng kha nh vy c gi l kha phin(session key).Vic s dng cc kha phin nh vy mang li kh nhiu u im m r rng nht l gim thiu tn tht lin quan n h thng khi kha b l.Bn cnh l vic hacker s phi mt nhiu cng hn,nhiu chi ph hn tm ra hn mt kha phin trong trng hp mun gii m lng ln thng ip v l do r rng l kha phin thay i lin tc.Trong thc t,kha phin c p dng thng xuyn trong cc dnh v nh m ha m thanh trong in thoi GSM v m ha hnh nh trong h thng TV v tinh c tr ph;trong c hai trng hp,kha phin c sinh ra trong khong thi gian tnh bng pht,hoc thm ch bng giy. u im ca ti ca kha thy r rng.Tuy nhin cu hi cn t ra l cc kha phin c cp nht nh th no.C hai hng tip cn vn ny,hng th nht l vic s dng cc giao thc trao i tha thun kha,tuy nhin mi ln thay i li pht sinh chi ph v thi gian,tin bc... c th trao i tha thun kha.Hng tip cn th hai l s dng cc knh chia s kha b mt c thip lp trc thu c kha phin-gi l chc nng dn xut kha(key derivation function-KDF).Trong m hnh di y,mt tham s r c thm vo vi kha b mt chung KAB gia Alice v Bob
47

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 3.1.M hnh dn xut kha iu quan trng ca chc nng dn xut kha l vic s dng hm mt chiu.Hm mt chiu c th khn chn vic k tn cng iu ch li K AB qua c th to ra hon ton cc kha phin khc. c th hon thnh vic dn xut kha,mt bn tham gia s gi mt nonce cho bn cn li.C hai s m ha nonce s dng kha b mt chia s trc KAB bng h mt kha b mt nh AES.... Mt cch na l m ha nonce s dng hm bm vi KAB.C hai bn s thc hin tnh ton HMAC vi nonce nh mt thng ip bnh thng

K ses = HMAC KAB (r)


Thay v gi nonce,Alice v Bob c th m kha mt s m cnt(counter) v m ha bng kha chia s trc to thnh kha phin

K ses = e KAB (cnt)


Hoc thc hin HMAC vi cnt

K ses = HMAC K (cnt)


AB

Vic s dng cnt gip cho Alice v Bob gim bt vic lin lc do khng cn gi gi tr trn ng truyn.Tuy nhin,c hai cn phi xc nh chnh xc khi no th cn sinh kha mi.Nu khng,mt thng ip ng b cnt cn phi c s dng. 1.3.Vn n2.

48

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Gi s kha b mt c chia s gia cc bn thng qua knh an ton.Tuy nhin,trong h thng c phm vi tng i ln.Vic bt gp vn n2 trong trao i kha hon ton c th din ra.Vn c m t nh sau Trong h thng c n user,mt ngi c th lin lc vi tt c mi ngi cn li trn knh an ton.V d Alice mun lin lc vi Bob th cn chia s kha KAB gia hai ngi v ch gia hai ngi,n-2 ngi cn li khng c bit kha ny.M hnh sau y m t v d trn vi s lng user l 4

Hnh 3.2.Kha trong h thng mng vi n=4 user Chng ta c th ngoi suy mt s c im trong trng hp n user 1
2

Mi user phi lu tr n-1 kha. C tng cng n(n-1) n2 kha trong ton b h thng mng. C tng cng n.(n-1)/2 cp kha phin.

4 Nu c thm user mi,knh an ton s phi c thit lp ti tt c mi ngi cn li upload kha mi. C th thy nu s lng user tng ln,hu qu m n mang li v cng kh chu.Tr ngi u tin l s lng n2 kha trong h thng,s lng user cng gia tng th n2 tng ln gp bi.Tr ngi th hai v cng nghim trng hn l mi ln thm mt user vo h thng th cn phi cp nht vi tt c user khc,m mi cp nht u yu cu knh an ton.iu ny v cng phin toi. V d:Mt cng ty kch thc gm 750 nhn vin mun trao i email an ton vi kha b mt.Nh vy c : 750 x 749/2=280.875 cp kha b mt c sinh ra v cn 750 x 749 = 561.750 kha phi c chia s qua knh an ton.Hn na,nu user th 751 tham gia vo cng ty,ton b 750 user cn li phi cp nht kha,tc l cn 751 knh an ton cn c tit lp.
49

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Nh vt cch tip cn ny khng ph hp vi nhng cng ty ln.Hp l hn khi p dng n vo nhng cng ty nh vi s lng n nh,khng thay i thng xuyn.V d thc t l mt cng ty vi s lng nh cc chi nhnh mun lin lc an ton vi cc chi nhnh cn li.Vic thm mt chi nhnh thng him khi xy ra. II.Mt s lc thit lp kha dng chung 1.Da trn h mt kha b mt 1.1.S dng trung tm phn phi kha (Key Distribution CenterKDC) 1.1.1.S c bn Ti lc ny,c bn gi v bn nhn s phi trao i trc vi KDC kha b mt ca mnh,gi l Key Encryption Key (KEK),kha ny c dng bo m bo an ton cho session key khi KDC gi cho ngi gi v ngi nhn. Nu ta gi kA,kB tng ng l kha b mt ca Alice v Bob KSES l kha phin trao mi ln giao tip gia Alice v Bod,kha ny c to bi KDC ta c lc thit lp kha nh sau

Hnh 3.3.S thit lp kha s dng KDC Qu trnh bt u bng thng ip RQST(IDA, IDB);trong IDA v IDB l nh danh cho mi bn tham gia.
1

Ti KDC c KA v KB do Alice v Bob cung cp


50

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu 2 3

KDC sinh ngu nhin mt kha phin KSES

KDC m ha kha phin ny bng KA v KB;sau gi cho mi bn tng ng

YA = e KA (K SES )
YB = e KB (K SES )
4 Ti mi bn tham gia,qu trnh gii m thng ip nhn t KDC din ra thu c kha phin. 5 Kha phin sau khi c gii m t thng ip s c dng m ha cc thng ip sau gia Alice v Bob.Lc ny KDC khng cn vai tr g na . Trong m hnh trn KEK KA v KB l nhng kha khng i,kha phin KSES l kha thay i thng xuyn,l tng nht l thay i theo tng phin.Ni theo cch hiu khc l KA v KB c tc dng to nn cc knh an ton,v KSES c KDC send cho mi bn theo cc knh tng ng.Trn thc t,trong dch v truyn hnh tr ph,kha KEK c dng vi thut ton m ha AES trao i kha phin,kha phin thng thng c thay i theo tng pht v c nhim v m ha thng ip thc s(nh tn hiu s...) bng thut ton m dng vi u im tc m ha nhanh,m bo vic gii m theo thi gian thc, tr t.Nh vy thut ton m ha dng vi kha phin khng nht thit phi mnh m,an ton nh thut ton dng khi phn phi kha phin.Ni cch khc,khi kha KEK b l,tt c cc traffic sau u b gii m v nghe ln. M hnh trn l m hnh c bn,c th thay i mt cht tit kim mt phin lin lc

51

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 3.4.M hnh thit lp kha s dng KDC(bin th) Trong m hnh ny thay v gi cho c hai bn(trong bc 3),KDC s gi c KEK YA , YB cho Alice.Alice ch c th gii m c YA ly kha phin.Kha phin sau c dng m ha thng ip y gi cho Bob.iu th v y l Bob s nhn hai bn m y v Y B.Bob s phi gii m YB thu c kha phin v dng kha phin gii m y. Hai m hnh trn u c u im l ch cn n cp kha i xng trong h thng.Khng ging nh lc trong phn 1,khi m vi n user lun cn n 2/2 cp kha.n kha KEK ny ch cn lu tr ti KDC,trong khi mi user ch cn lu KEK ca chnh mnh.iu quan trng l khi c mt user mi,knh an ton ch cn thit lp mt ln gia KDC v user ny. 1.1.2.Vn bo mt M hnh trn c th chng li cc cuc tn cng b ng nhu nghe nghe ln..nhng k tn cng vn c th ch ng thao tc trn thng ip v to ra thng ip gi mo a.Tn cng replay iu ng ch l c Alice v Bob u khng th chc chn rng kha phin m mnh nhn c l mi.Nu l kha s dng li th vn ti ca kha b xm phm.Vn ny cn tr nn nghim trng nu kha phin ny b l.Trong trng hp Malice lu li kha phin trc trong

52

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

h thng,Malice c th ng gi KDC gi li YA v YB cho Alice v Bob.Nu vy,Malice c th gii m cc thng ip gia Alice v Bob. b.Key Confirmation Attack Mt im yu na l Alice khng th m bo rng kha phin m mnh nhn c l kha phin dng lin lc vi Bob.Trong trng hp ny,Malice c th l mt user hp l c th thay i thng ip request la KDC v Alice thit lp phin vi mnh .M t tn cng nh sau

Hnh 3.5. Key Confirmation Attack im chnh trong tn cng loi ny l KDC ngh rng Alice yu cu mt kha phin lin lc vi Malice trong khi thc cht ngi m Alice mun lin lc l Bob.Alice tng nhm rng YM l YB v khng c cch no pht hin c l KDC li ang chun b phin lin lc gia mnh v Malice(trong trng hp KDC thm c nh danh IDM vi YM th Malice cng c th sa i header thnh IDB).Alice s ngh mnh ang chun b lin lc vi Bob,tip tc giao thc v m ha thng ip thnh y.Nu Malice chn c y th hon ton c th gii m thng ip ny. 1.2.Kerberos Giao thc tin tin hn chng li c tn cng replay v key confirmation attacks l Kerberos.Khng ch l giao thc phn phi kha,chc nng chnh ca kerberos l cung cp kh nng xc thc ngi dng trong mng my tnh.Kerberos ngy nay c s dng v cng rng ri.KDC y
53

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

c gi l trung tm xc thc(authentication server) trong m hnh kerberos.

Hnh 3.6.S trao i kha da trn giao thc Kerberos Alice sinh ra mt gi tr nonce NA v gi request ti KDC,request l RQST(IDA,IDB,NA) yu cu KDC to kha phin lin lc vi Bob.
1

KDC sinh ra mt kha phin KSES v thi gian tn ti ca kha phin T.Tnh ton
2

YA = e KA (K SES, N A ,T, ID B)

YB = e KB (K SES , ID A , T)
V gi YA,YB cho Alice. Alice khi nhn c YA,YB s tin hnh gii m YA ( YB Alice s khng th gii m c) thu c KSES,T,IDB,NA.Alice tin hnh kim tra IDB c phi l Bob hay khng,kim tra NA=NA hay khng,kim tra T c hp
3

54

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

l hay khng.Sau ,nu tt c hp l,Alice sinh ra mt tem thi gian T S v tnh ton YAB = e KSES (ID A , TS ) v gi YAB,YB ti Bob Bob gii m YB thu c KSES,IDA,T;gii m YAB thu c IDA,TS.Sau Bob kim tra IDA=IDA hay khng,kim tra T v TS c hp l hay khng.Nu hp l th phin lin lc gia Alice v Bob c to thnh Kerberos m bo tnh ng lc,thi s ca giao thc thng qua hai thng s
4

KDC xc nh khong thi gian tn ti T cho kha phin.T c m ha trong c YA v YB.Do ,Alice v Bob c th nhn thc c khong thi gian s dng kha phin ny.
1

Alice s dng mt tem thi gian TS,qua Bob c th m bo rng thng ip ca Alice l gn y v khng phi l mt tn cng pht li. lm c iu ny,ng h h thng ca Alice v Bob cn phi ng b vi nhau,nhng khng cn phi chnh xc cao,gi tr tr c th l vi pht. Vic s dng T v TS gip chng li tn cng replay t Malice.
2

Mt im quan trng na l kerberos cung cp k t chng thc v xc thc ngi dng.Ti bc 1,gi tr NA ca Alice chnh l mt thch thc gi cho KDC kim tra KDC c kh nng m ha N A bng kha KA hay khng.Nu gi tr tr v ca KDC trng vi kh tr N A gi i,Alice c th chc chn rng thng ip YA c gi i t KDC.y chnh l vic p dng giao thc xc thc thch thc-gii (challenge-respone) c cp trong chng trc.Vic a IDB vo trong YA l Alice chc chn kha phin ny l kha phin dng thit lp knh lin lc vi Bob.C Y A v YAB u c IDA Bob c th kim tra hai iu: 1 KDC gi kha phin thit lp knh gia Alice v Bob. 2 Bob ang thc s ni chuyn vi Alice. 1.3.Nhng vn cn tn ti trong k thut phn phi kha bng h mt i xng Mc d kerberos cung cp nhng kh nng mnh m m bo tnh an ton ca giao thc,tuy nhin vn cn nhng tr ngi trong giao thc cn nhc n
55

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

1 Knh lin lc:mt vn ca KDC lun cn phi nhc n l mt phin an ton lun cn c pht sinh mi gia hai thc th bt k trong h thng.Mc d bit cn tiu tn hiu nng m bo chc nng an ton.Nhng r rng nu h thng c s lng ngi dng khng l th y l vn cc k nghim trng.Trong Kerberos ,c th gim nguy c ny xung bng cch tng thi gian T ca kha phin,v trn thc t,kerberos c th s dng vi hng chc nghn user 2 Knh an ton trong qu trnh pht sinh:KDC cn knh an ton khi c m user mi phn phi kha KEK cho user im cht:Trong tt c cc giao thc da trn KDC,trong c c kerberos,lun tn ti mt vn an ton i l im cht(single point of failure), l c s d liu lu tr cc KEK.Nu KDC b k tn cng chim dng,tt c KEK trong ton b h thng s b l hoc tr thnh v hiu.Khi cn qu trnh thit lp li s dng knh an ton gia KDC v mi user
3

Khng cung cp kh nng perfect forward secrecy(PFS):Mt giao thc mt m c tnh nng PFS c kh nng ngn cn k tn cng ly c kha phin trc trong trng hp kha di hn b l.Nu bt k KEK u b kim sot(v d nh phn mm Trojan chy trn my user),vn s tr nn nghim trng.Trc ht l vic tt c cc thng ip trong tng lai s b gii m.V d,nu Malice c KEK KA ca Alice,Malice c th thu c tt c cc kha phin t thng ip YA gi t KDC.Bi kch hn,Malice c th gau m nhng lin lc trc n nu hn gi cc thng ip Y A v y c.Mc d Alice c th ngay lp tc nhn ra KEK b l v khng s dng na nhng Alice khng c cch no c th ngn Malice c c nhng lin lc trong qu kh.C kerberos v nhng giao thc trc khng cung cp PFS. c c PFS,cn phi trin khai lc kha cng khai. 2.Da trn h mt kha cng khai
4

2.1.Trao i kha thng qua thut ton Diffie-Hellman tho thun mt kho K chung cho c hai bn qua mt knh khng an ton m khng ai khc c th bit c, A v B c th dng th tc tho thun kho Diffie -Hellman sau:

56

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 3.7.Thut ton trao i kha Diffie-Hellman Chn trc mt s nguyn t p thch hp v mt phn t sinh g ca

Z* (2 g p 2) . Cc gi tr p v g c cng khai. p
A gi cho B gi tr g x mod p . (2.1) B gi cho A gi tr g y mod p . (2.2) Thc hin cc bc sau mi khi cn c kho chung:
a) A

chn mt s nguyn b mt x: 1 x p 2 v gi cho B thng bo B chn mt s nguyn b mt y: 1 y p 2 v gi cho A thng bo (2.2). B thu c g x v tnh kho chung K: K = (g x ) y mod p A thu c g y v tnh kho chung K: K = (g y ) x mod p

(2.1).
b)

c) d)

V d: Gi s A v B chn p = 11 v g=2 Nhm nhn xyclic sinh bi g:


{g i , i = 0,9} = {1, 2, 4,8,5,10,9,7,3,6}

(Cc phn t sinh ca nhm ny bao gm cc phn t sau: g=2,g3=8,g7=7,g9=6) Gi s A chn gi tr ngu nhin x = 4 v gi cho B gi tr 24 mod 11 =5. Gi s B chn gi tr ngu nhin y = 7 v gi cho A gi tr 27 mod 11 =7.
57

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

B nhn c 5 v tnh kho chung K=57 mod 11 =3. A nhn c 7 v tnh kho chung K=74 mod 11 =3. 2.2.Tn cng Man-in-The-Middle Tn cng MiTM l mt trong nhng tn cng nguy him nht ln cc thut ton kha cng khai.Di y l m t tn cng ln thut ton trao i kha Diffie-Hellman,cn lu rng,tn cng MiTM c th xy ra trn tt c cc thut ton kha bt i xng tr khi kha cng khai c bo v(vai tr thuc c cc chng ch s)

Hnh 3.8.Tn cng MiTM ln thut ton Diffie-Hellman Trong m hnh trn,Malice ng gi c Alice v Bob,hay ni cch khc,Malice thay i kha cng khai ca Alice v Bob bng chnh kha ca mnh.Sau khi thnh cng,kha ca ba ngi tng ng l

Kha ca Alice : K AM = (Y ')x mod p = m.x mod p . Kha ca Bob : K BM = (X ') y mod p = m.y mod p . Kha ca Malice bao gm c 2 kha trn

Trn thc t kha cng khai ca Malice,X v Y c cng gi tr.Hu qu l Alice v Bob khng thc c rng mnh ang chia s kha vi Malice.V nhng thng ip gia Alice v Bob s b c ln trn ng truyn bi Malice 2.3.Chng ch
58

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Vn ca tn cng MiTM l kha cng khai khng c xc thc.Trong m hnh trn,Bob nhn c kha cng khai c cho l ca Alice,nhng Bob li khng c cch no chng mnh iu ny l ng hay sai.Ly v d tnh hung ny nh sau: Gi s kha ca Alice l KA=(KpubA,IDA); trong IDA l thng tin nh danh(v d nh a ch IP ca Alice),kha cng khai KpubA l chui nh phn(v d 2048 bits).Nu Malice thc hin tn cng MiTM,hn cn thay i kha trn thnh KA=(KpubM,IDA).Nh vy ngoi chui bit,mi th u khng i,ngi nhn thng ip khng th pht hin ra rng thc ra chui bits l kha cng khai ca Malice.iu chng minh cho mnh :mc d lc kha cng khai khng cn knh an ton,nhng chng cn xc thc cc knh phn phi kha cng khai. Chng ta cn nhn mnh mt ln na l tn cng MiTM khng ch xy ra trn thut ton DH,m cn xy ra trn tt c cc thut ton bt i xng:kch bn vn khng thay i,k tn cng chn kha cng khai ca A(v B),thay th bng kha cng khai ca mnh.C nhiu cch gii quyt vn ny,mt trong s l s dng cc chng ch(certificate). tng n gin nh sau:bn cnh thng ip (KpubA,IDA) c th b tn cng b ng,chng ta c th p dng cc thut ton mt m xc thc.C th hn,chng ta s dng ch k s.Khi chng ch ca user Alice trong dng c bn nht l CertA=[(KpubA,IDA),sigKpri(KpubA,IDA)].Khi ngi nhn c th kim tra ch k s m bo thng ip khng b sa i.Chng ch yu cu ngi nhn phi c kha kim tra chnh xc, y l kha cng khai.Ch k s cho chng ch c cung cp bi trung tm tin cy CA(Certificate Authority).CA sinh chng ch v cp chng ch cho tt c cc user trong h thng. Vi vic sinh ra chng ch,chng ta c th phn bit c hai trng hp ch yu: 1 T ngi dng sinh ra cp kha bt i xng v yu cu CA k ln kha cng khai ca mnh.

59

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 3.9.User t sinh kha,CA cp chng ch im mu cht trong s ny chnh l thng ip u tin cn phi c gi trn knh xc thc,nu khng Malice request ch k s vi IDA. 2 CA sinh ra cp kha bt i xng cho ngi dng,v k ln kha cng khai ca ngi dng trc khi pht hnh chng ch cho h:

Hnh 3.10.CA sinh kha cho User Bc u tin trong m hnh cn c thc hin trong knh xc thc,ngha l CA cn phi m bo ngi xin chng ch l Alice ch khng phi mt ai gi mo Alice.Hn na,khi CA gi chng ch v cho Alice c kh kha b mt,v vy knh truyn khng nhng phi c xc thc m cn phi l knh an ton.Trn thc t,chng ch c th c gi qua email hay CD-ROM. Quay li vi thut ton DH,khi c p dng chng ch vo thut ton,ta c lc sau y:
60

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 3.11.Thut ton Diffie-Hellman vi chng ch iu ct yu y l vic kim tra chng ch.Nh trong lc trn,vic kim tra cc chng ch s dng kha cng khai ca CA.Kha cng khai ca CA phi c truyn trn knh c xc thc trnh vic Malice li tn cng MiTM.Nh vy cho d c s dng chng ch,knh c xc thc vn l yu cu cn thit.Tuy nhin,khc vi nhng phng thc khc trnh by,vic s dng chng ch yu cu knh xc thc ch mt ln,vo thi im thit lp u tin.Ngy nay,vic kim tra chng ch c tch hp trong cc phn mm nh trnh duyt web hay cc sn phm ca Microsoft.Cc knh xc thc y c gi nh l c cung cp trong qu trnh ci t cc phn mm(tt nhin l cc phn mm nguyn gc).Trong thut DH nguyn thy,Alice v Bob phi tin tng trc tip ln nhau,cn trong m hnh c chng ch,Alice v Bob cn tin kha cng khai ca CA.V nu CA c k ln kha cng khai ca mt User khc,th Alice v Bob cng c th tin tng user ny.iu ny to thnh mt chui tin tng ln nhau v rng hn l to thnh c s h tng kha cng khai PKI(Public Key Infrastructure).

Chng 4. TRAO I KHA DA TRN MT KHU


61

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

I.Tng quan v trao i kha ba bn Giao thc trao i kha ba bn l mt trong nhng k thut mt m quan trng trong giao tip an ton,vi k thut ny, 2 client c th trao i password vi server tin cy,qua c th tha thun session key-dng m ha v m bo tnh ton vn ca d liu.Trong nhiu nm qua,rt nhiu m hnh,lc trao i kha ba bn c cng b.Tuy nhin,khng phi tt c u m bo c yu cu an ton v hiu qu. Ly v d v lc kinh in Diffie-Hellman nm 1976,y l lc u tin cung cp kh nng trao i kha.Tuy nhin,iu ng tic l DiffieHellman khng cung cp kh nng xc thc,dn n vic giao thc ny d dng tr thnh nn nhn ca tn cng ngi ng gia(Man in the Middle). gii quyt vn ny,trong nhiu nm qua,rt nhiu cc giao thc trao i kha vi tnh nng xc thc c pht trin(nh Blake-Wilson nm 1997,Law nm 2003,Zhang nm 2002,Boyd nm 2004,,,,),bn cnh cc giao thc trao i kha da trn mt khu cng c nhiu cc chuyn gia quan tm. Cc giao thc trao i kha da trn mt khu(Password based Authenticated Key Exchange-PAKE) ch yu cu ngi dng nh passwordmt yu t an ton kinh in.V vic ch phi nh password khin cho giao thc ny tr nn n gin v hiu qu hn rt nhiu.Tuy nhin,tt c u bit rng,vic chn password cng khng phi l vic d dng.Nu chn password n gin,d nh th li rt d b tn cng nh password guess,tn cng t in hay vt cn.Cn theo chiu hng ngc li,nu chn password di,phc tp c th lm kh k tn cng nhng cng lm kh ngi dng v h rt c th cng khng nh ni password ca mnh.K t khi Bellovin v Merrit cng b PAKE u tin (nm 1992),n c nghin cu rng ri,v rt nhiu nhng giao thc tin b hn c pht trin Trong nhng nm gn y,bn cnh cc giao thc trao i kha 2 bn da trn mt khu(2PAKE),rt nhiu nghin cu bt u n cc giao thc trao i kha ba bn da trn mt khu(3PAKE).Trong m hnh ny,mi client s phi trao i password vi server trc,sau khi client mun to session-key,n s yu cu server xc thc bn pha cn li.
62

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Mc d,cc server c th gip cc client xc thc client cn li v thit lp session key,tuy nhin giao thc 3PAKE vn phi chng chu trc tn cng password guess.Nm 2000,giao thc 3PAKE c ci tin trong vic s dng kha cng khai ca server.iu ny lm gim thiu nguy c b tn cng on password.Tuy nhin,iu g cng c tnh hai mt,ngn chn c tn cng nhng li lm cho client kh khn hn v trc khi s dng cc client phi kim tra cc kha cng khai ca server trc. V l , gim thiu cng vic cho client,nm 2001,mt giao thc khc c cng b,iu c bit l giao thc ny khng s dng kha cng khai ca server II.Giao thc trao i kha da trn mt khu n gin 1.Lc S-PAKE Nm 2005,Abdalla v Pointcheval xut mt bin th mi ca giao thc Diffie-Hellman vi tn gi l chosen-base computational DiffieHellman(CCDH) v giao thc trao i kha da trn mt khu c m haSimple password based encrypted key exchange protocol(S-PAKE) Thut ton Diffie-Hellman c trnh by trong chng trc,xin c php khng nhc li.Thut ton CCDH c ni dung nh sau

63

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 4.1.M hnh trao i kha da trn mt khu S-PAKE Trong M,N l hai s ngu nhin trong G S: trusted server A,B : hai client pw : kha b mt c chia s gia A v B Bc 1. Pha user A 1.User A chn s ngu nhin x sao cho x Z p 2.Tnh X=gx mod p 3.Tnh X* = X.Mpw 4.Gi X* cho B Pha user B lm tng t 1.Chn s ngu nhin y sao cho y Z p 2.Tnh Y=gy mod p
64

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

3.Tnh Y*=Y.Npw 4.Gi Y* cho A Bc 2 Pha A : da vo thng tin Y* t B,user A s tnh


Y* 1. K A pw N
x

2.SKA=H(A,B,X*,Y*,KA) Pha B : da vo thng tin X* t A,user B s tnh


X* K B pw 1. M
y

2.SKB=H(A,B,X*,Y*,KB) 2.V d Gi s A v B chn p = 11 v g=2 Bc 1 Pha A 1.Chn s ngu nhin x=4,M=3,pw=6 2.Tnh X=24 mod 11 = 5 3.Tnh X* = 5.36 mod 11 = 4 4.Gi 4 cho B Pha B 1.Chn s ngu nhin y=9,N=5,pw=6 2.Tnh Y=29 mod 11 = 6 3.Tnh Y*=6.56 mod 11 = 8 4.Gi 8 cho A Bc 2 Pha A

65

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu


4

8 1.Tnh K A = 6 mod 11 = 84.5(-24) mod 11 4.5 mod 11 9 5

Pha B
4 1.Tnh K B = 6 mod 11 = 49.3(-54) mod 11 3.3 mod 11 = 9 3
9

Nh vy ta c thy K A = K B = g x. y ,khi A v B lp kha phin SK A v


SK B c gi tr ging nhau.

III.Giao thc trao i kha ba bn 1.Lc trao i kha ba bn ca Lu v Cao Trong trng hp A v B mun thit lp mt kha phin nhng trc ,c hai cha c kha b mt dng chung.Khi ,A v B khng th xc thc trc tip ln nhau v phi cn n vai tr ca server trung gian S.y chnh l m hnh trao i kha 3 bn da trn mt khu S-3PAKE(Simple three-party key exchange protocol) do Lu v Cao xut nm 2007.

Hnh 4.2.M hnh S-3PAKE Cc bc trong m hnh ny nh sau


66

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Bc 1 A 1.1.chn mt s ngu nhin x sao cho x Z p 1.2.Tnh X = g x .M pw1 1.3,Gi A||X cho B B 1.4.Chn mt s ngu nhin y sao cho y Zp 1.5.Tnh Y = g y .N pw2 1.6.Gi A||X||B||Y cho S Bc 2 S da vo thng tin A||X||B||Y v pw1,pw2,tnh 2.1. g x =
y 2.2. g =

X M pw1

Y N pw2

Sau S chn mt s ngu nhin z v tnh 2.3. g xz = ( g x ) 2.4. g yz = ( g y )


z

2.5. X ' = g yz .H ( A,S,g x ) 2.6. Y ' = g xz .H ( B,S,g y ) V gi X||Y cho B Bc 3

pw1

pw2

Khi B nhn c X||Y,B s dng pw2 v s b mt y tnh


xz 3.1. g =

H ( B,S,g y )
y

Y'

pw 2

3.2. g xyz = ( g xz )

67

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

3.3. = H ( A,B,g

xyz

Cui cng B gi X|| cho A Bc 4 Khi A nhn c X|| ,A s tnh


yz 4.1. g =

H ( A,S,g x )
x

X'

pw1

4.2. g xyz = ( g yz )

Sau A tin hnh kim tra c ng hay khng,nu khng,kt ni s b chm dt.Ngc li,A s tin tng g xyz l ng v tnh ton session key bng cng thc
xyz 4.3. SK A = H' ( A,B,g ) xyz Cui cng A tnh = H ( B,A,g ) v gi cho B

Bc 5 Da vo gi tr nhn c,B s kim tra c ng hay khng.Nu ng B s tnh ton session key theo cng thc 5.1. SK B = H' ( A,B,g
xyz

Kt qu ca qu trnh : Nu A,B,S thc hin chnh xc cc bc nu trn v c hai gi tr , u c chp nhn,A v B s c chung mt session
xyz key: SK A = SK B = H' ( A,B,g ) .

2.Tn cng trn giao thc S-3PAKE Khi mi cng b lc S-3PAKE,Lu v Cao tuyn b lc ny c th chng li nhng tn cng in hnh.Tuy nhin,thc t cho thy,S3PAKE vn khng th chng c nhng tn cng nh d mt khu hay gi mo 2.1.Tn cng d mt khu ngoi tuyn (Off-Line Password Guessing Attack)
68

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

2.1.1.Kch bn tn cng th nht

Hnh 4.3.Tn cng d mt khu ngoi tuyn(kch bn 1) Kch bn tn cng ny c He Debiao, Chen Jianhua v Hu Jin cp trong tp ch Informatica nm 2010. Cc bc thc hin tun t nh sau Bc 1 A 1.1.chn mt s ngu nhin x sao cho x Z p 1.2.Tnh X = g x .M pw1 1.3,Gi A||X cho B B 1.5.Tnh Y = 1.N pw2 = N pw2 1.6.Gi A||X||B||Y cho S Bc 2 S da vo thng tin A||X||B||Y v pw1,pw2,tnh 2.1. g x =
y 2.2. g =

X M pw1

Y =1 N pw2
69

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Sau S chn mt s ngu nhin z v tnh 2.3. g xz = ( g x )


z

2.4. g yz = ( g y ) = 1z = 1
z

2.5. X ' = g yz .H ( A,S,g x ) 2.6. Y ' = g xz .H ( B,S,g y ) V gi X||Y cho B Bc 3

pw1

= H ( A,S,gx )

pw1

pw2

Khi nhn c X||Y,B tin hnh tn cng on password ca A da vo


H ( A,S,g x )
pw1

v X = g x .M pw1 .Cc bc d password nh sau:

3.1)B gi s password ca A l pw.


3.2) Tnh 3.3) Tnh 3.4) So

T = (g x )' =

X da vo thng tin thu c t bc 1. M pw

X = H(A,S,T)pw da vo gi tr T va tnh.
?

snh X = X ' vi X ' thu c t S. X v X ' c cng gi tr th pw=pw1 hay password ca A l pw. X v X ' khc nhau th qua li bc 3.1. X = X ' v thu c

3.5) Nu 3.6) Nu

B s thc hin d password cho n khi no password ca A 2.1.2.Kch bn th 2

Kch bn tn cng ny c Ting-Fang Cheng, Chin-Chen Chang, ZhiHui Wang m t trong bi vit A Secure Protocol for Three-Party Authenticated Key Exchange with Provable Belief trong tp ch Information Sciences and Computer Engineering nm 2010. M t tn cng nh sau

70

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 4.4.M hnh tn cng d mt khu ngoi tuyn(kch bn 2) Cc bc tn cng: Bc 1: A 1.1.chn mt s ngu nhin x sao cho x Z p 1.2.Tnh X = g x .M pw1 1.3,Gi A||X cho B B 1.4.Chn mt s ngu nhin y sao cho y Zp . 1.5.Thay i X thnh M y . 1.6.Tnh Y = M.Npw 2 . 1.7.Gi A|| M y ||B||Y cho S. Bc 2: S da vo thng tin A|| M y ||B||Y v pw1,pw2,tnh:
71

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

My 2.1. g = pw1 = M y pw1 . M


x

M.N pw 2 2.2. g = = M. N pw2


y

Sau S chn mt s ngu nhin z v tnh: 2.3. g xz = M ( ypw1)z . 2.4. g yz = M z . 2.5. X ' = M z .H ( A,S,M y pw1 )
pw1

. .

2.6. Y ' = M ( ypw1)z .H ( B,S,g y ) V gi X||Y cho B. Bc 3:

pw2

Khi B nhn c X||Y,B ngt lun kt ni,sau s dng pw2 v s b mt y tnh:


xz 3.1. g =

H ( B,S,g

Y'

y pw 2

= M( y pw1)z .

3.2. B bt u on password ca A,gi s B on l pw.


3.2.1. 3.2.2. 3.2.3.

Tnh = M ( y pw1)z .H ( A,S,M y pw ) Tnh (X ')( ypw ) .

pw(y-pw)

So snh v (X ')( ypw ) ,nu hai gi tr l nh nhau th (X ')( ypw )

pw=pw1.Ngc li quay v bc 2. C th thy r


pw1(y-pw1)

rng .

tng

ng

vi

M ( ypw )z .H ( A,S,M ypw1 )

Khi = (X ')( ypw ) th:


M ( ypw1)z .H ( A,S,Mypw )
pw(y-pw)

= M ( ypw )z .H ( A,S,M ypw1 )


72

pw1(y-pw1)

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Suy ra pw=pw1. B thc hin lin tc bc 3.2.1 n 3.2.3 cho n khi tm c pw=pw1.Qu trnh ny c th mt thi gian xong hiu qu gn nh chc chn. Tm li vi hai dng tn cng ny,ta c th thy an ton ca giao thc S-3PAKE tng ng vi an ton trc nhng tn cng d mt khu thng thng C nhng bin php khc phc hai dng tn cng ny l Bin php u tin v hu hiu nht chnh l tng mnh ca mt khu:s dng mt khu di,c k t c bit,kh c th on bit trong t in. Mt cch khc phc i vi tn cng dng mt l t vic server tnh gy v (gy)z u bng 1,nn nu server c bc kim tra hai gi tr ny(gp gi tr 1 th ngt kt ni) th tn cng dng ny s khng th thc hin c. 2.2.Tn cng gi mo thc th(Impersonation Attack) V mt tng quan,lc S-3PAKE cho php hai thc th c th lin lc vi nhau trong qua mt server tin cy.Server ny nhn trch nhim xc thc tnh ng n ca hai thc th bt k lin quan v h tr vic to kha phin.Server tin cy ng vai tr c lp trong m hnh S-3PAKE.Tuy nhin,trong lc S-3PAKE,Server li khng kim tra tnh ng n ca cc thc th lin quan v tnh chnh xc ca cc thng ip nhn v.Server trong S-3PAKE ch n gin nhn thng ip yu cu ca Alice v Bob,sau tnh ton mt s cng thc gip Alice v Bob thit lp kha phin.iu ny c th to iu kin thut li cho nhng User hp l nhng bt lng thc hin tn cng gi mo.Tn cng ny c Ting-Fang Cheng, Chin-Chen Chang, Zhi-Hui Wang m t trong bi vit A Secure Protocol for ThreeParty Authenticated Key Exchange with Provable Belief trong tp ch Information Sciences and Computer Engineering.Chng ta gi s user l Oscar,ngi s ng gi Bob la Alice thc hin nhng tin trnh sau:

73

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 4.5.Tn cng gi mo thc th Bc 1 A 1.1.chn mt s ngu nhin x sao cho x Zp 1.2.Tnh X = g x .M pw1 1.3,Gi A||X cho B O 1.4.Oscar chn thng ip gi ti Bob 1.5.Chn mt s ngu nhin o sao cho o Zp 1.6.Tnh Y = g o .N pw3 1.7.Gi A||X||O||Y cho S Bc 2 S da vo trng tin A||X||O||Y v pw1,pw3,tnh 2.1. g x =
X M pw1

74

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

O 2.2. g =

Y N pw3

Sau S chn mt s ngu nhin z v tnh 2.3. g xz = ( g x ) 2.4. g oz = ( go )


z

2.5. X ' = g oz .H ( A,S,g x ) 2.6. Y ' = g xz .H ( O,S,go ) V gi X||Y cho O Bc 3

pw1

pw3

Khi O nhn c X||Y,O s dng pw3 v s b mt o tnh


xz 3.1. g =

H ( O,S,go )
o

Y'

pw3

3.2. g xoz = ( g xz )

3.3. = H ( A, B,g

xoz

Cui cng O gi X|| cho A Bc 4 Khi A nhn c X|| ,A s tnh


oz 4.1. g =

H ( A,S,g x )
x

X'

pw1

4.2. g xoz = ( g oz )

Sau A tin hnh kim tra c ng hay khng,nu khng,kt ni s b chm dt.Ngc li,A s tin tng g xoz l ng v tnh ton session key bng cng thc
xoz 4.3. SK A = H ' ( A,B,g )

75

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Nu cc bc kim tra thnh cng,gia Alice v Oscar tha thun c chung mt kha phin.Tuy nhin Alice li ngh rng mnh ang lin lc vi Bob ch khng phi Oscar. Tn cng theo kch bn ny s khng hiu qu trong mi trng mng khng dy.V khi Oscar s kh lng ngn gi tin n vi Bob.V nu vy Oscar kh lng gi mo Bob v Bob cng tnh ton v trao i thng ip vi Alice.V vy vic s dng S-3PAKE trong mi trng mng khng dy l c th c.

Chng 5 MINH HA TRN MAPLE


I.Gii thiu v Maple Maple l mt phn mm tnh ton do hng Maple Soft, mt b phn ch yu ca lin hp cng ty Waterloo Maple pht trin.Maple ra i nm 1991,
76

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

pht trin n phin bn 15 (n 6/2011) v c th chy trn tt c cc h iu hnh. Nhng tnh nng ni bt ca Maple: 1. Thc hin cc tnh ton vi khi lng ln, vi thi gian nhanh v chnh xc cao. 2. S dng cc gi chuyn dng ca Maple gii quyt cc bi ton c th nh: v th (gi plot), hnh hc gii tch (gi geometry), i s tuyn tnh (gi linalg),bit(gi Bits)... 3. Thit k cc i tng 3 chiu. 4. Mt ngn ng lp trnh n gin v mnh m, c kh nng tng tc vi cc ngn ng lp trnh khc; II.Minh ha trn maple Vi nhng tnh nng mnh m ca mnh,Maple l la chn hng u trong vic ging dy ton hc ni chung v trong mt m hc ni ring Di y l minh ha n trn Maple. 1.Giao thc trao i kha ba bn da trn mt khu S-3PAKE. Cc bn tham gia bao gm Alice,Bob v Server.Thng ip gi i v nhn v ti mi bn trong bi m phng ny c thc hin thng qua cc th mc chia s tng ng ti mi bn. Alice : D:/Alice/ Bob : C:/Bob/ Server: C:/Server M t di y tp trung ch yu vo qu trnh cc bn tnh ton x l d liu t c mc ch cui cng l to kha phin chung.Vic thc hin truyn file qua cc th mc xin php khng trnh by trong m phng ny. 1.1.Khi to

77

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 5.1.Chun b cc thng s Code thc hin chng trnh - Sinh p use DocumentTools in digit:=parse(GetProperty(TextDigit,'value')); p:=nextprime(rand(2^digit...2^(digit+1))()); SetProperty(Textp,'value',p); end use; ln ca p ph thuc vo s bits do ngi dng nhp,cu lnh parse(GetProperty(TextDigit,'value')) c tc dng ly gi tr ngi dng nhp vo truyn cho bin digit,p s c tnh l s nguyn t ngu nhin trong `khong 2digit n 2digti+1.Trong trng hp ny l t 2250 n 2251.Gi tr ca p sau c a ra textarea c tn Textp thng qua cu lnh SetProperty. - Phn t sinh g: TimG := proc (bignum)
78

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

local k, l, p, q, i, j,x,t,z; k := ifactor(bignum-1); l := nops(k); if l = 2 and type(op(2,k),integer) then l := l-1; end if; for i to l do q[i] := op(i,k); end do; for i to l do if (nops(q[i])>1) then q[i] := op(1,q[i]); end if; p[i] := op(1,q[i]); end do; for i from 2 to (bignum-1) do t:=0; for j from 1 to l do z:=power(i,(bignum-1)/p[j]) mod bignum; if(z<>1) then t:=t+1; else t:=0; end if; end do; if(t=l) then x:=i; break; end if
79

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

end do; return(x); end proc; g:=TimG(p); - To file with(Maplets[Elements]); mapletSendp := Maplet([" [Button("OK", Shutdown("true"))]]); use DocumentTools in sp:=convert(p,string); sg:=convert(g,string); sm:=convert(M,string); sn:=convert(N,string); pdir:="D:/Public/thongso.txt"; FileTools[Text][WriteLine](pdir,sp); FileTools[Text][WriteLine](pdir,sg); FileTools[Text][WriteLine](pdir,sm); FileTools[Text][WriteLine](pdir,sn); fclose(pdir); Maplets[Display](mapletSendp); on code trn c tc dng ghi p,g,M,N vo trong file D:/Public/thongso.txt v a ra thng bo cho ngi s dng. 1.2.Cc bn nhn thng s qua file to file thongso.txt",

80

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 5.2.Cc bn tham gia nhn thng s t file Code thc hin: with(Maplets[Elements]); mapletFile:= Maplet(["File khng tn ti", [Button("OK", Shutdown("true"))]]); pdir:="D:/Alice/thongso.txt"; if (FileTools[Exists](pdir)) then p:=parse(FileTools[Text][ReadLine](pdir)); g:=parse(FileTools[Text][ReadLine](pdir)); M:=parse(FileTools[Text][ReadLine](pdir)); N:=parse(FileTools[Text][ReadLine](pdir)); fclose(pdir); else Maplets[Display](mapletFile); end if; on code trn s c file D:/Alice/thongso.txt theo th t v gn cho gi tr p,g,M,N.Thut ton tng t trn Bob v Server. 1.3.Alice tnh A||X v gi cho Bob
81

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 5.2.Alice tnh A||X Code thc hin: - Tnh x: x ngu nhin trong khong 3 n p-1 x:=rand(3..p-1)(); - Tnh pw1 l dng s ca password pwA:="hocvienktmm"; temp:=convert(pwA,bytes); pw1:=parse(cat(seq(temp[i],i=1..nops(temp))));
-

Tnh X = g x .M pw1 X1:=power(g,x) mod p; X2:=power(M,pw1) mod p; X:=X1*X2 mod p;

- Tnh A||X : s dng php ni vi thut ton nh sau: l:=length(convert(p,binary)); noi1:=65*(2^l)+X;


82

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

snoi1:=convert(noi1,string); - Ghi ra file c a ch D:/Alice/AX.txt axdir:="D:/Alice/AX.txt"; FileTools[Text][WriteLine](axdir,snoi1); fclose(axdir); 1.4.Bob tnh A||X||B||Y v gi cho Server

Hnh 5.4.Bob tnh A||X||B||Y Code thc hin: -Nhn A||X t Alice:trc tin kim tra xem file c tn ti hay khng,nu c th file s c c thng qua bin noi1 axdir:="C:/Bob/AX.txt"; if (FileTools[Exists](axdir)) then noi1:=parse(FileTools[Text][ReadLine](axdir)); fclose(axdir);
83

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

- Tnh y : y ngu nhin trong khong t 3 n p-1 y:=rand(3..p-1)(); - Tnh pw2 pwB:="at3akma"; temp:=convert(pwB,bytes); pw2:=parse(cat(seq(temp[i],i=1..nops(temp))));
-

Tnh Y = g y .N pw2 Y1:=power(g,y) mod p; Y2:=power(N,pw2) mod p; Y:=Y1*Y2 mod p;

- Tnh A||X||B||Y l:=length(convert(p,binary)); b:=op(1,convert("B",bytes)); noi2:=b*(2^l)+Y; - Ghi ra file snoi:=convert(noi,string); axbydir:="C:/Bob/AXBY.txt"; FileTools[Text][WriteLine](axbydir,snoi); fclose(axbydir); 1.5.Server tnh X||Y

84

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 5.5.Server tnh X||Y - Tch gi tr X v Y axbydir:="C:/Server/AXBY.txt"; l:=length(convert(p,binary)); if (FileTools[Exists](axbydir)) then


85

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

noi:=parse(FileTools[Text][ReadLine](axbydir)); fclose(axbydir); Y:=noi mod(2^l); b:=op(1,convert("B",bytes)); noi2:=b*(2^l)+Y; X:=((noi-noi2)/(2^l)) mod (2^l); - Tnh z z:=rand(3..p-1)(); - Tnh pw1 v pw2 pwA:="hocvienktmm"; pwB:="at3akma"; temp:=convert(pwA,bytes); temp2:=convert(pwB,bytes); pw1:=parse(cat(seq(temp[i],i=1..nops(temp)))); pw2:=parse(cat(seq(temp2[i],i=1..nops(temp2))));
-

Tnh g x =

X M pw1

g1:=(X/power(M,pw1)) mod p;
y Tnh g =

Y N pw2

g2:=(Y/power(N,pw2)) mod p;
-

Tnh g xz = ( g x ) Tnh g yz = ( g y )

g13:=power(g1,z) mod p;
z

g23:=power(g2,z) mod p;
-

Tnh X ' = g yz .H ( A,S,g x ) read `sha1.m`;

pw1

s dng hm bm sha1
86

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

a:=op(1,convert("A",bytes)); s:=op(1,convert("S",bytes)); str1:=hash(convert(cat(a,s,g1),string)); num_str1:=convert(str1,decimal,36); pow_str1:=power(num_str1,pw1) mod p; X_phay:=g23*pow_str1 mod p;


-

Tnh Y ' = g xz .H ( B,S,g y ) read `sha1.m`;

pw2

s dng hm bm sha1

b:=op(1,convert("B",bytes)); s:=op(1,convert("S",bytes)); str2:=hash(convert(cat(b,s,g2),string)); num_str2:=convert(str2,decimal,36); pow_str2:=power(num_str2,pw2) mod p; Y_phay:=g13*pow_str2 mod p; - Tnh X||Y l:=length(convert(p,binary)); noiXYPhay:=X_phay*(2^l)+Y_phay; - Ghi ra file sXYPhay:=convert(noiXYPhay,string); xyPhaydir:="C:/Server/XphayYphay.txt"; FileTools[Text][WriteLine](xyPhaydir,sXYPhay); fclose(xyPhaydir); 1.6.Bob tnh gxz v

87

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh.5.6.Bob tnh gxz v Code thc hin : - Tch X v Y t tile XphayYphay.txt nhn t Server XYphaydir:="C:/Bob/XphayYphay.txt"; l:=length(convert(p,binary)); if (FileTools[Exists](XYphaydir)) then noiXYPhay:=parse(FileTools[Text][ReadLine](XYphaydir)); fclose(XYphaydir); Y_phay:=noiXYPhay mod (2^l); X_phay:=(noiXYPhay-Y_phay)/(2^l);
xz Tnh g =

H ( B,S,g y )

Y'

pw 2

s dng hm bm SHA-1

read `sha1.m`; b:=op(1,convert("B",bytes));


88

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

s:=op(1,convert("S",bytes)); g2:=power(g,y)mod p; str2:=hash(convert(cat(b,s,g2),string)); num_str2:=convert(str2,decimal,36); pow_str2:=power(num_str2,pw2) mod p; g13:=(Y_phay/pow_str2) mod p;


-

Tnh g xyz = ( g xz )

g123:=power(g13,y) mod p;
xyz Tnh = H ( A,B,g ) s dng hm bm SHA-1

a:=op(1,convert("A",bytes)); str3:=hash(convert(cat(a,b,g123),string)); alpha:=convert(str3,decimal,36);


-

Tnh X|| noi4:=X_phay*(2^l)+alpha;

- Ghi ra file snoi4:=convert(noi4,string); xalpha:="C:/Bob/XphayAlpha.txt"; FileTools[Text][WriteLine](xalpha,snoi4); fclose(xalpha); 1.7. Alice tnh gxz,kim tra v tnh

89

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 5.7.Alice tnh gxz,kim tra v tnh Code thc hin -Tch X v t file nhn c t Bob xalphadir:="D:/Alice/XPhayAlpha.txt"; l:=length(convert(p,binary)); if (FileTools[Exists](xalphadir)) then noi4:=parse(FileTools[Text][ReadLine](xalphadir)); fclose(xalphadir); alpha:=noi4 mod (2^l);
90

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

X_phay:=(noi4-alpha)/(2^l);
yz Tnh g =

H ( A,S,g x )

X'

pw1

s dng hm bm SHA-1

read `sha1.m`; g1:=power(g,x) mod p; a:=op(1,convert("A",bytes)); s:=op(1,convert("S",bytes)); str1:=hash(convert(cat(a,s,g1),string)); num_str1:=convert(str1,decimal,36); pow_str1:=power(num_str1,pw1)mod p; g23:=(X_phay/pow_str1)mod p; -Tnh g xyz = ( g yz )
x

g123:=power(g23,x) mod p; - Tnh ' = H(A, B,g xyz ) s dng hm bm SHA-1 read `sha1.m`; a:=op(1,convert("A",bytes)); b:=op(1,convert("B",bytes)); alpha2:=hash(convert(cat(a,b,g123),string)); num_alpha2:=convert(alpha2,decimal,36);
-

so snh ' v ,nu hai gi tr ging nhau th chng t nhn c l ng with(Maplets[Elements]);


91

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

mapletCheckA := Maplet(["Kim tra hon tt,gi tr alpha nhn c l chnh xc", [Button("OK", Shutdown("true"))]]); mapletCheckAFalse := Maplet(["Gi tr alpha nhn v l khng chnh xc", [Button("OK", Shutdown("true"))]]); if(num_alpha2=alpha)then Maplets[Display](mapletCheckA); else Maplets[Display](mapletCheckAFalse); end if;
-

Tnh s dng hm bm SHA-1 read `sha1.m`; beta:=hash(convert(cat(b,a,g123),string));

- Ghi ra file sbeta:=convert(beta,string); betadir:="D:/Alice/beta.txt"; FileTools[Text][WriteLine](betadir,sbeta); fclose(betadir); 1.8. Bob kim tra

92

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh 5.8. Bob kim tra Code thc hin:


-

Ly gi tr t file Alice gi betadir:="C:/Bob/beta.txt"; if (FileTools[Exists](betadir)) then beta:=FileTools[Text][ReadLine](betadir); fclose(betadir);

Tnh gi tr ' = H(A,B,g xyz ) s dng hm bm SHA-1 read `sha1.m`; g123:=power(g13,y)mod p; beta1:=hash(convert(cat(b,a,g123),string));

So snh v ' ,nu hai gi tr trng khp th nhn c l chnh xc with(Maplets[Elements]); mapletCheckB := Maplet(["Kim tra hon tt,gi tr Beta nhn c l chnh xc", [Button("OK", Shutdown("true"))]]); mapletCheckBFalse := Maplet(["Gi tr Beta khng chnh xc,phin kt ni s b ngt", [Button("OK", Shutdown("true"))]]);
93

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

if(beta=beta1)then Maplets[Display](mapletCheckB); else Maplets[Display](mapletCheckBFalse); end if; 1.9.Tnh kha phin s dng hm bm MD5

Hnh 5.9.To kha phin Code thc hin - Tnh kha phin with(StringTools); ska:=Hash(convert(cat(a,b,g123),string)); SetProperty(TextKeyA,'value',ska);
-

Ghi kha phin vo file(ch mnh Alice bit) keydir:="D:/Sessionkey/ska.txt"; FileTools[Text][WriteLine](keydir,ska); fclose(keydir);

- Gii phng cc bin sau khi hon thnh trao i kha restart; - Tng t vi bn Bob skb:=Hash(cat(a,b,g123)); SetProperty(TextKeyB,'value',skb); keydir:="C:/Sessionkey/skb.txt"; FileTools[Text][WriteLine](keydir,skb); fclose(keydir); restart;
94

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

1.10.Alice m ha thng ip s dng kha phin

Hnh 5.10.M ha thng ip Code thc hin: - Ly file thut ton m ha AES read `AES.m`; read `encryptAES.m`; read `decryptAES.m`; - Ly kha phin t file keydir:="D:/Sessionkey/ska.txt"; ska:=FileTools[Text][ReadLine](keydir); fclose(keydir); - Ly ni dung thng ip cn m ha mess:=GetProperty(TextMess,'value'); - Ct thng ip thnh cc khi c di 16 k t len:=length(mess); fin:=iquo(len,16)+1; pad:=16-irem(len,16); for i from 1 to fin do q[i]:=substring(mess,16*(i-1)+1..16*i); end do;
95

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

- Thm k t m vo chui cui cng,k t c thm y l # for i from 1 to pad do q[fin]:=cat(q[fin],"#"); end do; - Chuyn i kha phin thnh kha u vo thut ton AES tempkey:=[seq(substring(ska,2*i-1..2*i),i=1..16)]; key:=map(hexTo8Bits,tempkey); - M ha tng khi thng ip bng thut ton AES for i from 1 to fin do c[i]:=encryptAESascii(q[i],key); end do; - Ni cc khi m ha thnh mt chui duy nht cipher:=cat(seq(c[i],i=1..fin)); - Ghi ra file chuyn cho user scipher:=convert(cipher,string); cipherAdir:="D:/Alice/cipherA.txt"; FileTools[Text][WriteLine](cipherAdir,scipher); fclose(cipherAdir); 1.11.Bob gii m s dng kha phin

Hnh 5.11.Gii m thng ip. Code thc hin - Nhn file bn m


96

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

cipherAdir:="C:/Bob/cipherA.txt"; if (FileTools[Exists](cipherAdir)) then cipher2:=FileTools[Text][ReadLine](cipherAdir); fclose(cipherAdir); - Ly file thut ton m ha AES read `AES.m`; read `encryptAES.m`; read `decryptAES.m`; - Ly file thut ton m ha AES keydir:="C:/Sessionkey/skb.txt"; skb:=FileTools[Text][ReadLine](keydir); fclose(keydir); - Tch chui m ha thnh cc khi ring bit len:=length(cipher2); fin:=len/32; for i from 1 to fin do c[i]:=substring(cipher2,32*(i-1)+1..32*i); end do; - Chuyn i kha phin thnh kha u vo thut ton AES tempkey:=[seq(substring(skb,2*i-1..2*i),i=1..16)]; key:=map(hexTo8Bits,tempkey); - Gii m tng khi ring bit for i from 1 to fin do q[i]:=decryptAESascii(c[i],key); end do; - Ct b cc k t tha t:=0;
97

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

for i from 1 to 16 do if(q[fin][i]="#") then t:=t+1; end if; end do; - Ni li thnh chui hon chnh cui cng q[fin]:=substring(q[fin],1..16-t); clear:=cat(seq(q[i],i=1..fin)); 2.Tn cng d mt khu trn giao thc S-3PAKE

Hnh 5.12.Lc tn cng don password ngoi tuyn Gi s cc thng s c khi to v gi cho cc bn tham gia. Alice tnh ton A||X v gi A||X cho Bob.Kch bn tn cng s tp trung vo nhng vic m Bob lm sau . 2.1.Bc u tnh ton Code thc hin Ly A||X t file l:=length(convert(p,binary)); axdir:="C:/Bob/AX.txt";
98

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

if (FileTools[Exists](axdir)) then noi1:=parse(FileTools[Text][ReadLine](axdir)); fclose(axdir); - Tch ly X X:=noi1 mod (2^l);


-

Tnh Y=Npw2 pwB:="at3akma"; temp:=convert(pwB,bytes); pw2:=parse(cat(seq(temp[i],i=1..nops(temp)))); Y:=power(N,pw2) mod p;

- Tnh B||Y b:=op(1,convert("B",bytes)); noi2:=b*(2^l)+Y; - Tnh A||X||B||Y noi:=noi1*(2^l)+noi2; - Ghi ra file snoi:=convert(noi,string); axbydir:="C:/Bob/AXBY.txt"; FileTools[Text][WriteLine](axbydir,snoi); fclose(axbydir); 2.2.Thc hin d mt khu

99

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

Hnh.5.13.Thc hin d mt khu Code thc hin - Tch gi tr X v Y t file gi t Server XYphaydir:="C:/Bob/XphayYphay.txt"; l:=length(convert(p,binary)); if (FileTools[Exists](XYphaydir)) then noiXYPhay:=parse(FileTools[Text][ReadLine](XYphaydir)); fclose(XYphaydir); Y_phay:=noiXYPhay mod (2^l); X_phay:=(noiXYPhay-Y_phay)/(2^l); - M hp thoi ly ng dn n file t in with(Maplets[Elements]): maplet := Maplet(FileDialog['FD1']( 'filefilter' = "txt", 'filterdescription' = "Text", 'filename'="C:/TuDien/TuDienA.txt",'onapprove'= Shutdown(['FD1']), 'oncancel' = Shutdown() )): dip:=Maplets[Display](maplet);
100

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

passdir:=op(1,dip); - Tin hnh d Password trn file t in with(Maplets[Elements]); mapletPassFound := Maplet([" tm c password ca Alice", [Button("OK", Shutdown("true"))]]); mapletPassFalse := Maplet(["Rt tic,khng tm thy password ca Alice trong t in", [Button("OK", Shutdown("true"))]]); count:=FileTools[Text][CountLines](passdir); FileTools[Text][Close](passdir); for i from 1 to count do q[i]:=FileTools[Text][ReadLine](passdir); end do; FileTools[Text][Close](passdir); result:=false; for i from 1 to count do temp:=convert(q[i],bytes); pw:=parse(cat(seq(temp[j],j=1..nops(temp)))); T1:=power(M,pw) mod p; T2:=(X/T1) mod p; a:=op(1,convert("A",bytes)); s:=op(1,convert("S",bytes)); Xtemp:=convert(hash(convert(cat(a,s,T2),string)),decimal,36); Xguess:=power(Xtemp,pw) mod p; if(Xguess=X_phay)then result:=true; pw3:=q[i]; break; end if;
101

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

end do; if(result) then Maplets[Display](mapletPassFound); SetProperty(TextPassA,'value',pw3); else Maplets[Display](mapletPassFalse); SetProperty(TextPassA,'value',""); end if;

KT LUN
Sau khong thi gian lm n,em c th rt ra kt lun nh sau nm bt c mt s giao thc xc thc t xa v nhng tn cng in hnh ln cc giao thc Nm r v cc giao thc trao i kha,c bit l giao thc trao i kha ba bn da trn mt khu,vi u im l n gin c kh nng trin khai cao.Tuy nhin vn tn ti nhng im yu c th b k xu li dng tn cng,lm hi ngi dng. a ra c nhng bin php phn no hn ch nhng im yu trong giao thc ny. Thnh cng trong vic minh ha giao thc trao i kha ba bn da trn mt khu v tn cng d mt khu trn giao thc bng cng c Maple. Qua nhng iu nm c,em xin php xut hng pht trin cho ti l nghin cu khc phc nhng im yu c hu ca giao thc trao i kha da trn mt khu, giao thc tr nn mnh m hn nhng vn khng nh mt u im ca mnh.

102

Nghin cu mt s lc xc thc t xa v giao thc trao i kha ba bn da trn mt khu

` TI LIU THAM KHO


1.Gio trnh l thuyt c s mt m Hc Vin K Thut Mt M. 2.Gio trnh mt m hc nng cao- Hc Vin K Thut Mt M. 3.Gio trnh c s an ton thng tin - Hc Vin K Thut Mt M. 4. Modern Cryptography: Theory and Practice - Wenbo Mao 5. Understanding Cryptography - Bart Preneel 6. Simple three-party key exchange protocol - R. Lu, Z. Cao . 7. Cryptanalysis of simple threeparty key exchange protocol - He Debiao, Chen Jianhua and Hu Jin. 8.A Secure Protocol for Three-Party Authenticated Key Exchange with Provable Belief - Ting-Fang Chenga, Chin-Chen Chang,Zhi-Hui Wang 9. Maple Learning Guide-Maplesoft

103

You might also like