Authenticated Key Agreement Protocols: A Comparative Study

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols

Key agreement protocols are used to exchange keys between two or multiple entities. The exchanged key can be later used to assure confidentiality through encryption. Additionally authenticated key agreement protocols offer implicit authentication. In this paper we conduct a security and efficiency comparison of tripartite authenticated identity-based key agreement protocols and review all of th...

متن کامل

A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols

We survey the set of all prior two-party certificateless key agreement protocols available in the literature at the time of this work. We find that all of the protocols exhibit vulnerabilities of varying severity, ranging from lack of resistance to leakage of ephemeral keys up to (in one case) a man-in-the-middle attack. Many of the protocols admit keycompromise impersonation attacks despite cl...

متن کامل

Cryptanalysis of Some Authenticated Key Agreement Protocols

In this article, we show that both Seo-Sweeney’s and Hwang’s authenticated key agreement protocols are insecure against several attacks, such as masquerade, dictionary, replay, and modifying attacks.

متن کامل

Authenticated Diffie-Hellman Key Agreement Protocols

This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, and NIST. The practical and provable security aspects of these protocols are discussed.

متن کامل

Certificateless Authenticated Two-Party Key Agreement Protocols

Certificateless public key cryptography (CL-PKC) was proposed to overcome the weaknesses of the public key infrastructure (PKI) and identity-based cryptography (ID-PKC). In PKI, certificates are used to provide the authenticity of public keys. However, a PKI faces many challenges in practice, such as the scalability of the infrastructure and certificate management (distribution, revocation, sto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security

سال: 2015

ISSN: 2153-1234,2153-1242

DOI: 10.4236/jis.2015.61006