Ironwood meta key agreement and authentication protocol

نویسندگان

چکیده

Number theoretic public-key solutions, currently used in many applications worldwide, will be subject to various quantum attacks, making them less attractive for longer-term use. Certain group constructs are now showing promise providing quantum-resistant cryptographic primitives, and may provide suitable alternatives those looking address known attacks. In this paper, we introduce a new protocol called Meta Key Agreement Authentication Protocol (MKAAP) that has some characteristics of solution shared-key solution. Specifically, it the deployment benefits system, allowing two entities have never met before authenticate without requiring real-time access third-party, but does require secure provisioning key material from trusted distribution system (similar symmetric system) prior deployment. We then describe specific MKAAP instance, Ironwood MKAAP, discuss its security, show how resists certain attacks such as Shor's algorithm or Grover's search algorithm. also implemented on several "internet things" (IoT devices), measure performance, performs significantly better than ECC using fewer device resources.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ironwood Meta Key Agreement and Authentication Protocol

Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...

متن کامل

An Efficient Authentication and Key Agreement Protocol in RFID System

Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...

متن کامل

An Efficient ECC-based Authentication and Key Agreement Protocol

Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...

متن کامل

An Extended Authentication and Key Agreement Protocol of UMTS

Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a new UMTS AKA protocol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Advances in Mathematics of Communications

سال: 2021

ISSN: ['1930-5346', '1930-5338']

DOI: https://doi.org/10.3934/amc.2020073