肖跃雷, 武君胜, 朱志祥. 可信计算环境下的IKEv2协议扩展方案[J]. 微电子学与计算机, 2018, 35(12): 1-7.
引用本文: 肖跃雷, 武君胜, 朱志祥. 可信计算环境下的IKEv2协议扩展方案[J]. 微电子学与计算机, 2018, 35(12): 1-7.
XIAO Yue-lei, WU Jun-sheng, ZHU Zhi-xiang. Extended Internet Key Exchange Protocol Version 2 in Trusted Computing Environment[J]. Microelectronics & Computer, 2018, 35(12): 1-7.
Citation: XIAO Yue-lei, WU Jun-sheng, ZHU Zhi-xiang. Extended Internet Key Exchange Protocol Version 2 in Trusted Computing Environment[J]. Microelectronics & Computer, 2018, 35(12): 1-7.

可信计算环境下的IKEv2协议扩展方案

Extended Internet Key Exchange Protocol Version 2 in Trusted Computing Environment

  • 摘要: 在IKEv2协议基础上, 利用ISO/IEC 9798-3:1998/Amd 1:2010中的认证机制, 提出了一种可信计算环境下的IKEv2协议扩展方案, 实现了发起者和响应者之间的双向身份认证和平台认证, 并建立了它们之间的会话密钥, 且与IKEv2协议是向后兼容的, 其中可信第三方(TTP)负责它们的身份证书验证、平台证明身份密钥(AIK)证书验证和平台完整性评估, 它们的存储完整性度量日志(SML)被加密传输给可信第三方, 从而有效地解决了现有可信计算环境下IKE协议扩展方案所存在的问题.此外, 利用针对可信网络连接协议的串空间模型证明了该IKEv2协议扩展方案是安全的.

     

    Abstract: On the basis of the IKEv2, an extended IKEv2 in trusted computing environment based on ISO/IEC 9798-3:1998/Amd 1:2010 is proposed in this paper. It realizes mutual identity authentication and Platform-Authentication between an initiator and a responder, and establishes session keys between them, and is backward compatible with the IKEv2, where a trusted third party (TTP) is responsible for validating the identity and Attestation Identity Key (AIK) certificates of them, and evaluating the platform integrity of them, and the stored integrity measurement logs (SML) of them are encrypted and sent to the TTP. Thus, it is able to solve the problems of the existing extended IKE protocol for trusted computing environment effectively. Moreover, the extended IKEv2 is proved secure based on the strand space model for trusted network connect protocols.

     

/

返回文章
返回