Authenticated Key Agreement Protocols: A Comparative Study
نویسندگان
چکیده
منابع مشابه
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols
Key agreement protocols are used to exchange keys between two or multiple entities. The exchanged key can be later used to assure confidentiality through encryption. Additionally authenticated key agreement protocols offer implicit authentication. In this paper we conduct a security and efficiency comparison of tripartite authenticated identity-based key agreement protocols and review all of th...
متن کاملA Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
We survey the set of all prior two-party certificateless key agreement protocols available in the literature at the time of this work. We find that all of the protocols exhibit vulnerabilities of varying severity, ranging from lack of resistance to leakage of ephemeral keys up to (in one case) a man-in-the-middle attack. Many of the protocols admit keycompromise impersonation attacks despite cl...
متن کاملCryptanalysis of Some Authenticated Key Agreement Protocols
In this article, we show that both Seo-Sweeney’s and Hwang’s authenticated key agreement protocols are insecure against several attacks, such as masquerade, dictionary, replay, and modifying attacks.
متن کاملAuthenticated Diffie-Hellman Key Agreement Protocols
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, and NIST. The practical and provable security aspects of these protocols are discussed.
متن کاملCertificateless Authenticated Two-Party Key Agreement Protocols
Certificateless public key cryptography (CL-PKC) was proposed to overcome the weaknesses of the public key infrastructure (PKI) and identity-based cryptography (ID-PKC). In PKI, certificates are used to provide the authenticity of public keys. However, a PKI faces many challenges in practice, such as the scalability of the infrastructure and certificate management (distribution, revocation, sto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security
سال: 2015
ISSN: 2153-1234,2153-1242
DOI: 10.4236/jis.2015.61006