Ironwood meta key agreement and authentication protocol
نویسندگان
چکیده
Number theoretic public-key solutions, currently used in many applications worldwide, will be subject to various quantum attacks, making them less attractive for longer-term use. Certain group constructs are now showing promise providing quantum-resistant cryptographic primitives, and may provide suitable alternatives those looking address known attacks. In this paper, we introduce a new protocol called Meta Key Agreement Authentication Protocol (MKAAP) that has some characteristics of solution shared-key solution. Specifically, it the deployment benefits system, allowing two entities have never met before authenticate without requiring real-time access third-party, but does require secure provisioning key material from trusted distribution system (similar symmetric system) prior deployment. We then describe specific MKAAP instance, Ironwood MKAAP, discuss its security, show how resists certain attacks such as Shor's algorithm or Grover's search algorithm. also implemented on several "internet things" (IoT devices), measure performance, performs significantly better than ECC using fewer device resources.
منابع مشابه
Ironwood Meta Key Agreement and Authentication Protocol
Number theoretic public key solutions are subject to various quantum attacks making them less attractive for longer term use. Certain group theoretic constructs show promise in providing quantum-resistant cryptographic primitives. We introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteristics of a public key solution and some of a share...
متن کاملAn Efficient Authentication and Key Agreement Protocol in RFID System
Due to the very limited computing resource, storing space and electric power supply of tag, it is a great challenge for us to design a practical RFID protocol which is security, efficient and can be used in the low-cost tag. In 2007, He et al. proposed an authentication and key agreement protocol which is used in the process of communication between the low-cost tag and reader. They also proved...
متن کاملAn Efficient ECC-based Authentication and Key Agreement Protocol
Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...
متن کاملAn Extended Authentication and Key Agreement Protocol of UMTS
Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a new UMTS AKA protocol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Mathematics of Communications
سال: 2021
ISSN: ['1930-5346', '1930-5338']
DOI: https://doi.org/10.3934/amc.2020073