Non-associative key establishment protocols and their implementation
نویسندگان
چکیده
We provide implementation details for non-associative key establishment protocols. In particular, we describe the implementation of non-associative key establishment protocols for all left self-distributive and all mutually left distributive systems.
منابع مشابه
Iterated LD-Problem in non-associative key establishment
We construct new non-associative key establishment protocols for all left self-distributive (LD), multi-LD-, and mutual LD-systems. The hardness of these protocols relies on variations of the (simultaneous) iterated LDproblem and its generalizations. We discuss instantiations of these protocols using generalized shifted conjugacy in braid groups and their quotients, LDconjugacy and f -symmetric...
متن کاملNon-associative key establishment for leftdistributive systems
We construct non-associative key establishment protocols for all LD-, multi-LD-, and other left-distributive systems. 2010 Mathematics Subject Classification. 20N02, 20F36.
متن کاملA Framework for Design of Key Establishment Protocols
A framework is described in which designs for key establishment protocols may be described at a high level of abstraction. This enables protocols to be designed without concern for implementation details , while emphasising the fundamentals elements required. Consideration of the natural alternatives leads to the deenition of four fundamental classes of key establishment protocols into one of w...
متن کاملThe importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We revisit recent work of Choo, Boyd, Hitchcock, & Maitland (2004) wh...
متن کاملRefuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We examine the class of key agreement protocols (without proofs of se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1312.6794 شماره
صفحات -
تاریخ انتشار 2013