Filters








19,001 Hits in 5.0 sec

Authenticated Diffe-Hellman Key Agreement Protocols [chapter]

Simon Blake-Wilson, Alfred Menezes
1999 Lecture Notes in Computer Science  
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem.  ...  The practical and provable security aspects of these protocols are discussed.  ...  The following three-pass AKC protocol [13] is derived from the Unified Model AK protocol (Protocol 5) by adding the MACs of the flow number, identities, and the ephemeral public keys.  ... 
doi:10.1007/3-540-48892-8_26 fatcat:akczicmnxfbn5p6qvsirvnfune

Tripartite Authenticated Key Agreement Protocols from Pairings [chapter]

Sattam S. Al-Riyami, Kenneth G. Paterson
2003 Lecture Notes in Computer Science  
Joux's protocol [29] is a one round, tripartite key agreement protocol that is more bandwidthefficient than any previous three-party key agreement protocol.  ...  The security properties of the new protocols are studied using provable security methods and heuristic approaches. Applications for the protocols are also discussed.  ...  Our one round protocols build on Joux's protocol and draw on ideas from the Unified Model [4] , MTI [35] and MQV [32] protocols. In Section 5, we consider proofs of security for our protocols.  ... 
doi:10.1007/978-3-540-40974-8_27 fatcat:tjml4y5zqvgodpfhvrxfepdfce

Reusing Static Keys in Key Agreement Protocols [chapter]

Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu
2009 Lecture Notes in Computer Science  
We also propose an enhancement of the extended Canetti-Krawczyk security model and definition for the situation where static public keys are reused in two or more key agreement protocols.  ...  Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard.  ...  This standard specifies several variants of the Diffie-Hellman protocol, including one-pass, two-pass and three-pass versions of the Unified Model (UM) (see [4] and [18] ) and MQV [15] key agreement  ... 
doi:10.1007/978-3-642-10628-6_3 fatcat:5won3rndsbd3toy2maahtgzkqm

Automated key exchange protocol evaluation in delay tolerant networks

Sofia Anna Menesidou, Dimitrios Vardalis, Vasilios Katos
2016 Computers & security  
The difficulties and challenges are attributed to the peculiarities and constraints of the harsh communication conditions DTNs typically operate in, rather than the actual features of the underlying key  ...  In this paper we propose a framework for evaluation of key exchange protocols in a DTN setting.  ...  The proposed framework is used to compare a selection of one-pass key authenticated key agreement protocols.  ... 
doi:10.1016/j.cose.2016.02.006 fatcat:fnammt3hlngtzdsrgk2ovymfqa

Authenticated Key Exchange (AKE) in Delay Tolerant Networks [chapter]

Sofia Anna Menesidou, Vasilios Katos
2012 IFIP Advances in Information and Communication Technology  
In this paper we investigate the options for integrating key exchange protocols with the Bundle Protocol. We demonstrate this by using a one-pass key establishment protocol.  ...  In doing so, we also highlight the peculiarities, issues and opportunities a DTN network maintains, which heavily influences the underlying security solution.  ...  The key agreement protocols we selected for comparison are the Key Exchange Algorithm (KEA) [20] , the one-pass version (KEA1) and the version with key confirmation (KEAA), the Unified Model (UM) [1]  ... 
doi:10.1007/978-3-642-30436-1_5 fatcat:wvhhgfmqbfh5hpjnbn6nzj5cna

Provably repairing the ISO/IEC 9798 standard for entity authentication1

David Basin, Cas Cremers, Simon Meier, Pierpaolo Degano, Joshua D. Guttman
2013 Journal of Computer Security  
We analyze the cause of these weaknesses, propose repaired versions of the protocols, and provide automated, machine-checked proofs of their correctness.  ...  Moreover, we show how modern verification tools can be used for the falsification and certified verification of security standards.  ...  Protocol Description Part 2: Symmetric-key Cryptography 9798-2-1 One-pass unilateral authentication 9798-2-2 Two-pass unilateral authentication 9798-2-3 Two-pass mutual authentication 9798-2-4 Three-pass  ... 
doi:10.3233/jcs-130472 fatcat:qg7uropcengvpaaia6p7hzr5yi

Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard

Alfred Menezes, Berkant Ustaoglu
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 800-56A standard.  ...  The UM protocol is believed to possess all important security attributes including key authentication and secrecy, resistance to unknown key-share attacks, forward secrecy, resistance to known-session  ...  Since we are primarily interested in analyzing the security of the UM protocol, we will only describe our model for three-round key agreement protocols where the initiator sendsB an ephemeral public key  ... 
doi:10.1145/1368310.1368348 dblp:conf/ccs/MenezesU08 fatcat:5jnr3r5henerlc62j7tfvxw4ea

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication [chapter]

David Basin, Cas Cremers, Simon Meier
2012 Lecture Notes in Computer Science  
We analyze the cause of these weaknesses, propose repaired versions of the protocols, and provide automated, machine-checked proofs of their correctness.  ...  Moreover, we show how modern verification tools can be used for the falsification and certified verification of security standards.  ...  Protocol Description Part 2: Symmetric-key Cryptography 9798-2-1 One-pass unilateral authentication 9798-2-2 Two-pass unilateral authentication 9798-2-3 Two-pass mutual authentication 9798-2-4 Three-pass  ... 
doi:10.1007/978-3-642-28641-4_8 fatcat:fderlbru7jhfhkeudaio3zxu6e

Improved one-pass IP Multimedia Subsystem authentication for UMTS

Lili Gu, Mark A Gregory
2011 The International Conference on Information Networking 2011 (ICOIN2011)  
protocol under different environments, and in-depth analysis of the system performance, security and terminal's energy consumption.  ...  It is observed that the 4G standardized authentication protocols include double execution of the Authentication and Key Agreement (AKA) which increases the system's complexity, results in significant authentication  ...  Analysis The proposed one-pass authentication protocol was simulated and an analysis was carried out by comparing it with the 4G LTE two-pass authentication protocol and the proposed one-pass authentication  ... 
doi:10.1109/icoin.2011.5723109 dblp:conf/icoin/GuG11 fatcat:wqafbuianza6bfwlo7ts2zc4cm

A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks

Mahdi Aiash
2012 International journal of network security and its applications  
However, this brings to the fore certain security issues which must be addressed, the most important of which is the initial Authentication and Key Agreement (AKA) to identify and authorize mobile nodes  ...  The analysis shows that most of the research had realized the openness of the core network and tried to deal with it using different methods.  ...  Fourthly, based on the performed analysis, we highlight the main source of security threats and propose some recommendations to address them.  ... 
doi:10.5121/ijnsa.2012.4413 fatcat:qg6ttn7a5venphdmrsmzmivete

Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes [article]

Mohamed Amine Ferrag, Leandros Maglaras, Antonios Argyriou, Dimitrios Kosmanos, Helge Janicke
2017 arXiv   pre-print
The countermeasures and informal and formal security analysis techniques used by the authentication and privacy preserving schemes are summarized in form of tables.  ...  authentication with privacy, deniable authentication with privacy, authentication with mutual anonymity, authentication and key agreement with privacy, and three-factor authentication with privacy.  ...  No [115] 2009 -Strand spaces model [149] -Authentication and Key Agreement -Confidentiality -Analyze security performance of the authentication and key agreement protocol.  ... 
arXiv:1708.04027v1 fatcat:lozrjocwq5eblkams72kk4rv6i

Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems

Darpan Anand, Vineeta Khemchandani, Munish Sabharawal, Omar Cheikhrouhou, Ouissem Ben Fredj, Vijay Kumar
2021 Security and Communication Networks  
This solution also provides the features such as scalability, security, and transparency based on distributed computing and working on multiserver architecture.  ...  Authentication is the primary and mandatory process for any Information and Communication Technology (ICT) application to prove the legitimacy of the genuine user.  ...  Omar Cheikhrouhou thanks Taif University for its support under the project Taif University Researchers supporting project number TURSP-2020/55, Taif University, Taif, Saudi Arabia.  ... 
doi:10.1155/2021/9940183 fatcat:lbqcy52bm5gw5cgq5bhpiuukxa

An OAuth2.0-Based Unified Authentication System for Secure Services in the Smart Campus Environment [chapter]

Baozhong Gao, Fangai Liu, Shouyan Du, Fansheng Meng
2018 Lecture Notes in Computer Science  
Based on the construction of Shandong Normal University's smart authentication system, this paper researches the key technologies of Open Authorization(OAuth) protocol, which allows secure authorization  ...  improve the security and reliability of campus data acquisition.  ...  Through three years' analysis chart of interface access times, we know that the three most frequently accessed interfaces are the library, card and user personal information API.  ... 
doi:10.1007/978-3-319-93713-7_73 fatcat:7f2antz6jvf5zj2tvatax736xu

2011 Index IEEE Transactions on Information Forensics and Security Vol. 6

2011 IEEE Transactions on Information Forensics and Security  
., +, TIFS Sept. 2011 906-919 Independent component analysis Depth Estimation of Face Images Based on the Constrained ICA Model. Sun, Z.  ...  ., +, TIFS Sept. 2011 1146-1159 Information security Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks.  ... 
doi:10.1109/tifs.2011.2176153 fatcat:i2wz3suxbnemvbinhkvjwesq2y

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions [chapter]

Süleyman Kardaş, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci
2012 Lecture Notes in Computer Science  
We show that the security of Sadeghi et al.'s PUF based authentication protocol is not secure in this model. We provide a new technique to improve the security of their protocol.  ...  Comparing to the previous protocols, the use of PUFs in our protocol enhances the system in terms of security, privacy and tag computational overhead.  ...  Acknowledgment We thank anonymous referees for valuable comments on a previous version of this paper. This work has been partially funded by FP7-Project ICE under the grant agreement number 206546.  ... 
doi:10.1007/978-3-642-25286-0_6 fatcat:d7of7ql3rzbovmlkf4ku5cihby
« Previous Showing results 1 — 15 out of 19,001 results