On Robust Key Agreement Based on Public Key Authentication
نویسنده
چکیده
We describe two new attacks on the HMQV protocol. The first attack raises a serious question on the basic definition of “authentication” in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr’s signature. Among all the related protocols, YAK appears to be the simplest so far. We believe simplicity is an important engineering principle.
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملOn Robust Key Agreement Based on Public Key Authentication (Short Paper)
We describe two new attacks on the HMQV protocol. The rst attack raises a serious question on the basic de nition of authentication in HMQV, while the second attack is generally applicable to many other protocols. In addition, we present a new authenticated key agreement protocol called YAK. Our approach is to depend on well-established techniques such as Schnorr's signature. Among all the rela...
متن کاملA Chebyshev-Map Based One-Way Authentication and Key Agreement Scheme for Multi-Server Environment
One-way authentication and key agreement scheme can achieve strong user anonymity and transmitted data confidentiality over insecure public communication channel, which is very useful for the user who cares about his/her identity information. In conventional networks, Public Key Infrastructure (PKI) is a very useful component to design one-way authentication key agreement scheme. However, it wi...
متن کاملA One-Way Authentication Key Agreement Scheme with User Anonymity Based on Chaotic maps towards Multi-Server Architecture
One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve oneway authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a la...
متن کاملAuthentication Protocol using MYK-NTRUSign Signature Algorithm in Wireless Network Environment
In this paper, we propose a new bidirectional authentication and key agreement protocol based on the MYK-NTRUSign signature algorithm. The AES encryption algorithm and hash techniques were adopted to build our protocol. To implement the mutual authentication and session key agreement, the proposed protocol includes two phases: namely initial phase and mutual authentication with key agreement ph...
متن کامل