نتایج جستجو برای: key exchange

تعداد نتایج: 727500  

Journal: :CoRR 2012
Arkadius G. Kalka

We introduce a generalized Anshel-Anshel-Goldfeld (AAG) key establishment protocol (KEP) for magmas. This leads to the foundation of non-associative public-key cryptography (PKC), generalizing the concept of non-commutative PKC. We show that left selfdistributive systems appear in a natural special case of a generalized AAG-KEP for magmas, and we propose, among others instances, concrete realiz...

Journal: :IACR Cryptology ePrint Archive 2014
Qianying Zhang Shijun Zhao Dengguo Feng

UKS (unknown key-share) attacks are common attacks on Authenticated Key Exchange (AKE) protocols. We summarize two popular countermeasures against UKS attacks on implicitly authenticated key exchange protocols. The first one forces the CA to check the possession of private keys during registration, which is impractical for the CA. The second one adds identities in the derivation of the session ...

1996
Shahram Bakhtiari Reihaneh Safavi-Naini Josef Pieprzyk

This paper presents an attack on Anderson and Lomas's proposed password-based authenticated key exchange protocol that uses col-lisionful hash functions. The weaknesses of the protocol when an old session key is compromised are studied and alternative solutions are given.

Journal: :Int. J. Communication Systems 2018
Younes Hatri Ayoub Otmani Kenza Guenda

Authenticated Key Exchange (AKE) protocols represent an important cryptographic mechanism that enables several parties to communicate securely over an open network. Elashry, Mu and Susilo proposed in 2015 an Identity Based Authenticated Key Exchange (IBAKE) protocol where different parties establish secure communication by means of their public identities. The authors also introduced a new secu...

Journal: :IACR Cryptology ePrint Archive 2010
Qingfeng Cheng Chuangui Ma

Recently, Liu proposed two authenticated multiple key exchange protocols using pairings, and claimed two protocols featured many security attributes. In this paper, we show that Liu’s protocols are insecure. Both of Liu’s protocols cannot provide perfect forward secrecy.

Journal: :IACR Cryptology ePrint Archive 2005
Ayan Mahalanobis

In this paper we study a key exchange protocol similar to DiffieHellman key exchange protocol using abelian subgroups of the automorphism group of a non-abelian nilpotent group. We also generalize group no.92 of HallSenior table [15], for arbitrary prime p and show that for those groups, the group of central automorphisms commute. We use these for the key exchange we are studying. MSC: 94A62, 2...

Journal: :IACR Cryptology ePrint Archive 2012
Cas J. F. Cremers Michèle Feltz

We show that it is possible to achieve perfect forward secrecy in two-message key exchange (KE) protocols that satisfy even stronger security properties than provided by the extended Canetti-Krawczyk (eCK) security model. In particular, we consider perfect forward secrecy in the presence of adversaries that can reveal the long-term secret keys of the actor of a session and reveal ephemeral secr...

Journal: :IACR Cryptology ePrint Archive 2006
Markus Volkmer

This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have been proposed on the non-authenticated principle. Adding and some extra entity authentication method i...

2003
Colin Boyd Wenbo Mao Kenneth G. Paterson

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof...

2012
Tamer Barakat

Recently, Eun-Jun et al.'s proposed an improvement of the authentication key exchange protocol. In their protocol, they proved that neither Hung et al.’s nor Tian et al.’s provide perfect forward secrecy, and present an improved protocol in order to address this problem. In this paper, we will demonstrate some security leaks inherent in Eun-Jun et al.'s protocol and show that this protocol is s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید