A key exchange protocol relying on polynomial maps

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the key exchange with nonlinear polynomial maps of stable degree

We say that the sequence g n , n ≥ 3, n → ∞ of polynomial transformation bijective maps of free module K n over commutative ring K is a sequence of stable degree if the order of g n is growing with n and the degree of each nonidentical polynomial map of kind g n k is an independent constant c. A transformation b = τ g n k τ −1 , where τ is affine bijection, n is large and k is relatively small,...

متن کامل

On the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree

We say that the sequence gn, n ≥ 3, n → ∞ of polynomial transformation bijective maps of free module Kn over commutative ring K is a sequence of stable degree if the order of gn is growing with n and the degree of each nonidentical polynomial map of kind gn is an independent constant c. Transformation b = τgnkτ−1, where τ is the affine bijection, n is large and k is relatively small, can be use...

متن کامل

Internet Key Exchange (IKEv2) Protocol

This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations. This version of the IKE specification combines the contents of what IKEv2 draft-ietf-ipsec-ikev2-15.txt [Page 1] Internet-Draft August 13, 2004 were previously separate documents, including IS...

متن کامل

Secure Authenticated Key Exchange Protocol

From Seo and Sweeney proposed SAKA (Simple Authenticated Key agreement Algorithm), many SAKA variants were proposed to cope with the weaknesses in SAKA. However, they still are vulnerable to off-line password guessing attack. This paper proposes a new secure authenticated key exchange protocol that can resist off-line password guessing attack. To solve the vulnerability of former protocols, key...

متن کامل

A secure key agreement protocol based on chaotic maps∗

To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.’s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Mathematics for Industry

سال: 2019

ISSN: 2661-3352,2661-3344

DOI: 10.1142/s2661335219500035