Full Secure Key Exchange and Authentication with no Previously Shared Secrets
نویسندگان
چکیده
When speaking about secure networks, the bootstrapping process is very often forgotten or at least ignored. Some of the methods used so far do not protect against impersonation (Diffie-Hellman exponential key exchange) or have an important computational complexity (public-key based methods). A new algorithm is presented which is able to achieve key exchange whilst ensuring secrecy and authentication with a reasonable amount of computation.
منابع مشابه
Authenticated Session Keys and Their Server-aided Computation
Key exchange is one of the elementary prerequisites for secure communications. This paper rst discusses some desirable properties of key exchange protocols, and then presents a set of protocols for Diie-Hellman based authenticated key exchange. This paper then considers a server-aided approach to fast computation of shared secrets, which may be useful for smart card implementation of key exchange.
متن کاملAdaptive Weak Secrets for Authenticated Key Exchange*
This paper describes biometric-based cryptographic techniques that use weak secrets to provide strong, multi-factor and mutual authentication, and establish secure channels for subsequent communications. These techniques rely on lightweight cryptographic algorithms for confidential information exchange. Lightweight algorithms are suitable for use in resource constrained environments such as the...
متن کاملMulti - Factor Password - Authenticated Key Exchange ( full version )
We consider a new form of authenticated key exchange which we call multi-factor passwordauthenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other’s identity without directly disclo...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کامل