Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures

نویسندگان

  • Josep Domingo-Ferrer
  • Llorenç Huguet i Rotger
چکیده

Section 2 introduces some clcmcntary mathematical concepts that will be used throughout the paper. Section 3 specifics the necessary assumptions and initializations for the method proposed here. Section 4 describes the key exchange protocol. Section 5 prcscnts a variation of the key exchange algorithm, which yields the signature schcmc. In Section b, a number of attacks to the key cxchangc and signature schemes arc outlined and countered. ~cction 7 reviews two current key exchange algorithms (Diffie-Hellman and RSA) and a signaturc schcmc (ElGamal), and points out their weaknesses and disadvantages. Finally, Section 8 contains a few concluding remarks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Trust-based Mutual Authentication for Bootstrapping in 6LoWPAN

IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) has emerged as a promising technology to realize ambient intelligence under the vision of the Internet of Things. Under most circumstances, it is imperative that security be addressed from bootstrapping to data transmission. In this paper, we propose a secure bootstrapping scheme that includes mutual authentication and trust evaluatio...

متن کامل

Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation

In this work, we introduce two full functional identity-based authentication and key exchange (IDAKE) schemes for mobile ad hoc networks (MANETs). Therefore, we utilize some special features of identity-based cryptographic (IBC) schemes, such as pre-shared secret keys from pairings and efficient key management, to design MANET-IDAKE schemes that meet the special constraints and requirements of ...

متن کامل

Pre-shared Key Agreement for Secure Public Wi-Fi

This paper presents a novel pre-shared key (PSK) agreement scheme to establish a secure connection between a Wi-Fi client and access point (AP) without prior knowledge of a password. The standard IEEE 802.11 security method, Robust Security Network Association, widely known as Wi-Fi Protected Access (WPA) and WPA2, derives a shared cryptographic key if and only if a user provides an identical p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 9  شماره 

صفحات  -

تاریخ انتشار 1990