A key exchange protocol relying on polynomial maps
نویسندگان
چکیده
منابع مشابه
On the key exchange with nonlinear polynomial maps of stable degree
We say that the sequence g n , n ≥ 3, n → ∞ of polynomial transformation bijective maps of free module K n over commutative ring K is a sequence of stable degree if the order of g n is growing with n and the degree of each nonidentical polynomial map of kind g n k is an independent constant c. A transformation b = τ g n k τ −1 , where τ is affine bijection, n is large and k is relatively small,...
متن کاملOn the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree
We say that the sequence gn, n ≥ 3, n → ∞ of polynomial transformation bijective maps of free module Kn over commutative ring K is a sequence of stable degree if the order of gn is growing with n and the degree of each nonidentical polynomial map of kind gn is an independent constant c. Transformation b = τgnkτ−1, where τ is the affine bijection, n is large and k is relatively small, can be use...
متن کاملInternet Key Exchange (IKEv2) Protocol
This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations. This version of the IKE specification combines the contents of what IKEv2 draft-ietf-ipsec-ikev2-15.txt [Page 1] Internet-Draft August 13, 2004 were previously separate documents, including IS...
متن کاملSecure Authenticated Key Exchange Protocol
From Seo and Sweeney proposed SAKA (Simple Authenticated Key agreement Algorithm), many SAKA variants were proposed to cope with the weaknesses in SAKA. However, they still are vulnerable to off-line password guessing attack. This paper proposes a new secure authenticated key exchange protocol that can resist off-line password guessing attack. To solve the vulnerability of former protocols, key...
متن کاملA secure key agreement protocol based on chaotic maps∗
To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.’s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Mathematics for Industry
سال: 2019
ISSN: 2661-3352,2661-3344
DOI: 10.1142/s2661335219500035