摘要
This paper analyses the host authentication mechanism in the current POD (point-of-deployment) Copy Protection System. At first, the re-authentication procedure can not stand out a simple replay attack. Secondly, the host authentication protocol makes a DH (Diffie-Hellman) private key in any run as significant as a device private key. At last, the credentials of the POD module are futile. The result urges a technical improvement of the current host authentication mechanism(1).
- 出版日期2005-8
- 单位西安电子科技大学