Non-associative key establishment protocols and their implementation

نویسندگان

  • Arkadius G. Kalka
  • Mina Teicher
چکیده

We provide implementation details for non-associative key establishment protocols. In particular, we describe the implementation of non-associative key establishment protocols for all left self-distributive and all mutually left distributive systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Iterated LD-Problem in non-associative key establishment

We construct new non-associative key establishment protocols for all left self-distributive (LD), multi-LD-, and mutual LD-systems. The hardness of these protocols relies on variations of the (simultaneous) iterated LDproblem and its generalizations. We discuss instantiations of these protocols using generalized shifted conjugacy in braid groups and their quotients, LDconjugacy and f -symmetric...

متن کامل

Non-associative key establishment for leftdistributive systems

We construct non-associative key establishment protocols for all LD-, multi-LD-, and other left-distributive systems. 2010 Mathematics Subject Classification. 20N02, 20F36.

متن کامل

A Framework for Design of Key Establishment Protocols

A framework is described in which designs for key establishment protocols may be described at a high level of abstraction. This enables protocols to be designed without concern for implementation details , while emphasising the fundamentals elements required. Consideration of the natural alternatives leads to the deenition of four fundamental classes of key establishment protocols into one of w...

متن کامل

The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols

Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We revisit recent work of Choo, Boyd, Hitchcock, & Maitland (2004) wh...

متن کامل

Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols

Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof of security. Flaws detected long after the publication and/or implementation of protocols will erode the credibility of key establishment protocols. We examine the class of key agreement protocols (without proofs of se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1312.6794  شماره 

صفحات  -

تاریخ انتشار 2013