Key Exchange Protocol over Insecure Channel
نویسنده
چکیده
Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard, and keeping the keys secret is much harder. Cryptanalysts usually attack both symmetric and public key cryptosystems through their key management. We introduce a protocol to exchange cipher keys over insecure communication channel. This protocol is based on public key cryptosystem, especially elliptic curve cryptosystem. Meanwhile, it tests the cipher keys and selects only the good keys and rejects the weak one. Keywords—Key management and key distribution.
منابع مشابه
A Model of Key Agreement Protocol using Polynomials over Non-Cummutative Division Semirings
The basic aim of key exchange is that two people who can only communicate via an insecure channel want to find a common secre t key without any attack. In this paper we show a model of key-agreement protocol using polynomials over non-commutative division semiring for network security. It is proved that the proposed protocol meets several security attributes under the assumption that the polyno...
متن کاملA New Scheme for Key Exchange
** (West Bengal University of Technology, West Bengal, India) *** (West Bengal State University, West Bengal, India) ABSTRACT Key management represents a major and the most sensitive part of cryptographic systems. It includes key generation, key distribution, key storage, and key deletion. It is also considered the hardest part of cryptography. Designing secure cryptographic algorithms is hard,...
متن کاملAuthenticated Key Exchange with Synchronized States
Nowadays, most of sensitive applications over insecure network are protected by some authenticated secure channel which is highly relies on specific authenticated key exchange (AKE) protocol. Nevertheless, the leakage of authentication credential used in AKE protocol somehow result in unauthorized exploitation of credential information via identity impersonation (IDI) attack. To address the pro...
متن کاملSecure Communications over Insecure Channels Using an Authenticated Channel
A secure peer-to-peer communication over an insecure channel without any prior exchanged key can be established with the help of an authentication step to exchange a public key. Then, standard methods of public-key cryptography such as RSA can be used to communicate securely. In this work, we concentrate on message authentication protocols which require an extra authenticated channel. We start ...
متن کاملAn Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed threeparty authen...
متن کامل