Filters








56,747 Hits in 6.5 sec

sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices [chapter]

Shijun Zhao, Qianying Zhang
2015 Lecture Notes in Computer Science  
We finally formally prove the security of sHMQV in the CK model.  ...  HMQV and (s,r)OAKE 1 protocols are the state-of-the-art in the integrity of security and efficiency.  ...  For authenticated key exchange protocols, it's a basic requirement to achieve the basic security property defined by security models for key exchange, such as the CK [3] or the eCK model [15] .  ... 
doi:10.1007/978-3-319-17533-1_11 fatcat:r6fbetno7fbtjmaquhxp4pjtvy

CCBKE — Session key negotiation for fast and secure scheduling of scientific applications in cloud computing

Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen
2013 Future generations computer systems  
load without sacrificing the level of security.  ...  In this paper, we propose Cloud Computing Background Key Exchange (CCBKE), a novel authenticated key exchange scheme that aims at efficient security-aware scheduling of scientific applications.  ...  We are also grateful for the useful discussions with researchers from Swinburne University of Technology on astrophysics research.  ... 
doi:10.1016/j.future.2012.07.001 fatcat:7g6obvocbrfoxplainqjtdggbe

Design "Strong Diffie-Hellman-Exponential-Schnnor Key Exchange" Over Elliptic Curves (SDH-XS-KE Over EC)

Demba Sow, Mamadou Ghouraissiou Camara
2019 Journal of Mathematics Research  
SDH-XS-KE is a key echange protocol proposed in 2014. The protocol SDH-XS-KE improves the”Strong Diffie-Hellman-DSA Key Exchange (called SDH-DSA-KE)” proposed by Jeong and al. in 2007.  ...  In this paper, we design the so called  ”Strong Diffie-Hellman-Exponential-Schnnor Key Exchange (called SDH-XS-KE)”over Elliptic curves.  ...  Next, they proposed "Strong Diffie-Hellman-Exponential-Schnorr Key Exchange" (briefly: SDH-XS-KE) which is an improvement of SDH-DSA-KE for efficiency and security.  ... 
doi:10.5539/jmr.v11n4p26 fatcat:m33atkymuzfilhwj33anu2qh24

Attack on ``Strong Diffie-Hellman-DSA KE" and Improvement

Demba Sow, Mamadou Ghouraissiou Camara, Djiby Sow
2014 Journal of Mathematics Research  
After, we propose "Strong Diffie-Hellman-Exponential-Schnorr Key Exchange" (briefly: SDH-XS-KE) which is an improvement of SDH-DSA-KE for efficiency and security.  ...  In this paper, we do a cryptanalyse of the so called "Strong Diffie-Hellman-DSA Key Exchange (briefly: SDH-DSA-KE)" and after we propose "Strong Diffie-Hellman-Exponential-Schnnor Key Exchange (briefly  ...  Perfect forward secrecy (PFS). a key-exchange protocol is said to have the PFS property if the leakage of the long-term key of a party does not compromise the security of session keys established by that  ... 
doi:10.5539/jmr.v6n1p70 fatcat:dn4gwhbwdjdw3d26mzhqop3hs4

Ace

Michael Backes, Aniket Kate, Esfandiar Mohammadi
2012 Proceedings of the 2012 ACM workshop on Privacy in the electronic society - WPES '12  
They defined the concept of one-way authenticated key exchange (1W-AKE) and presented a provably secure 1W-AKE protocol called ntor, which is under consideration for deployment in Tor.  ...  Goldberg, Stebila and Ustaoglu recently characterized the security and privacy properties required by the key exchange protocol used in the OR network.  ...  draft of the paper.  ... 
doi:10.1145/2381966.2381974 dblp:conf/wpes/BackesKM12 fatcat:6qrtkj7wircutnbzkunvrpoqf4

Towards Privacy Preserving Commutative Encryption-Based Matchmaking in Mobile Social Network

Fizza Abbas, Ubaidullah Rajput, Adnan Manzoor, Imtiaz Ali, Ayaz Hussain
2018 International Journal of Advanced Computer Science and Applications  
The last decade or so has witnessed a sharp rise in the growth of mobile devices.  ...  This leads to the emergence of a new type of social networking known as Mobile Social Network (MSN).  ...  First, Alice and Bob exponentiate (encrypt) their interests with their respective keys and exchange the exponentiated interests.  ... 
doi:10.14569/ijacsa.2018.090548 fatcat:mw3wxuhkerfcllhnnnik26f46q

An Experimental Study of Cryptography Capability using Chained Key Exchange Scheme for Embedded Devices [article]

Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Syed Farid Syed Adnan, Ramlan Mahmod
2014 arXiv   pre-print
After 38 years of birthday Diffie-Hellman Key Exchange (DHKE), there are many proposed improvements in the DHKE protocol to encounter modern security issues.  ...  Our proposed scheme in the TFTP protocol will secure the sharing of secrets and symmetric keys (e.g., AES256).  ...  INTRODUCTION he state of art for key exchange protocol is based on 1976 paper "New Directions in Cryptography" [1] , Diffie and Hellman Key Exchange (DHKE) present a secure key agreement protocol that  ... 
arXiv:1409.0065v1 fatcat:egt2fwfzubhjvj6fiwapsxtoa4

Analyzing EAP TLS and ERP Protocol with varying processor speed

Bhawna Gupta, Seema Mehla
2010 International Journal of Computer Applications  
This paper analyzed the security cost of EAP TLS & ERP with increased processor speed.  ...  In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator.  ...  Here analyzing the security cost of EAP-re-Authentication & EAP TLS protocol. The ERP proposal is for improving the EAP keying architecture.  ... 
doi:10.5120/1336-1774 fatcat:d2c4g5yjyfe3jlz77f4o4zvpju

A data security protocol for the Trusted Truck® system

S. A. Bulusu, B. Arazi, I. Arel, A. Davis, G. Bitar
2010 Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10  
Security has become one of the major concerns in the context of Intelligent Transportation Systems (ITS).  ...  To render data exchange in Trusted Truck ® more secure, this paper proposes a secured data protocol which ensures data integrity, message authentication and non-repudiation.  ...  Mathematical explanations of the algorithms are provided to support the observed performance improvements.  ... 
doi:10.1145/1852666.1852707 dblp:conf/csiirw/BulusuAADB10 fatcat:3nc5tpznvbgxthpb7nbbr76zw4

Constructing a Secure Point-to-Point Wireless Environments by Integrating Diffie-Hellman PKDS and Stream Ciphering

Yi-Fung Huang, Fang-Yie Leu, Ko-Chung Wei
2010 2010 International Conference on Complex, Intelligent and Software Intensive Systems  
According to the security analysis of this study, the SePem can efficiently and securely protect a wireless environment.  ...  That is why security has been one of the most important issues in wireless communication studies. Encrypting messages to ciphertext is one of the methods to solve this problem.  ...  The DiHam [10] [11] was developed based on the PKMv1 by improving the key exchange flow and providing different data security levels.  ... 
doi:10.1109/cisis.2010.27 dblp:conf/cisis/HuangLW10 fatcat:n7wvvvhbyvc3tp5qinbsmkkgke

Authentication and authenticated key exchanges

Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener
1992 Designs, Codes and Cryptography  
The definition of a secure protocol is considered, and desirable characteristics of secure protocols are discussed.  ...  We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques.  ...  The security of the exponential key exchange relies on the apparent intractability of the discrete logarithm problem [Odly91] .  ... 
doi:10.1007/bf00124891 fatcat:3s2dp6jbmnhlzhnmc2sbny6ypm

An improved Kerberos protocol based on fast RSA algorithm

Dahui Hu, Zhiguo Du
2010 2010 IEEE International Conference on Information Theory and Information Security  
the security and efficiency of the improved Kerberos.  ...  After an analysis of its security flaws, the paper improves Kerberos by applying fast RSA algorithm, more specifically, using Montgomery algorithm to count modular exponentiation of large numbers, and  ...  decrypt, revise and fake the tickets of the improved protocol because they are firstly encrypted by the public keys of users then signed by the private keys of ticket issuers.  ... 
doi:10.1109/icitis.2010.5689457 fatcat:rmpdj6fyrrdrjnzhhj3i5kzyke

A novel key exchange algorithm for security in internet of things

Suresh Koduru, PVGD Prasad Reddy, Padala Preethi
2019 Indonesian Journal of Electrical Engineering and Computer Science  
The performance of the proposed algorithm had shown a great improvement over the popular Diffie Hellman key exchange algorithm and a two-level security for data exchange between the parties is implemented  ...  As security is a major challenge in internet of things, it is important to design a key management solution that considers resource constrained nodes and hence key management in public key cryptography  ...  key transport Diffie-hellman (DH) Key agreement SHA-1/SHA-256 Integrality Convert Pa and Pb into binary & gray coded decimalStep 5: Exchange of keys of both the parties Step 6: Convert the exchanged  ... 
doi:10.11591/ijeecs.v16.i3.pp1515-1520 fatcat:j4b64ogmifeijiq76xv2uefv6a

An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing

Chang Liu, Xuyun Zhang, Chengfei Liu, Yun Yang, Rajiv Ranjan, Dimitrios Georgakopoulos, Jinjun Chen
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
In our new scheme, we design a two-phase layer-by-layer iterative key exchange strategy to achieve more efficient AKE without sacrificing the level of data security.  ...  Based on this view, data security becomes a major concern in the adoption of cloud computing.  ...  and the number of instances involved are large, which is why we need to improve the efficiency of key exchange schemes.  ... 
doi:10.1109/trustcom.2013.65 dblp:conf/trustcom/LiuZLYRGC13 fatcat:rzyv2dgadngsdhajphxflklrey

Authenticated Broadcast in Heterogeneous Wireless Sensor Networks using Chinese Remainder Theorem Algorithm

Palanisamy
2011 Journal of Computer Science  
Results: The proposed RSA with CRT algorithm is improved the secured routing paradigm and provides efficient key management which using optimal encryption/decryption of broadcast messages authentication  ...  Key management only makes sure the communicating nodes possess the necessary keys, at the same time protecting the confidentiality, integrity and authenticity of the communicated data.  ...  Comparison of time consumption for key exchange in server side between (ELGAMAL, RSA, and PKC) and proposed systemFig. 4: Comparison of time consumption for key exchange in client side between (ELGAMAL  ... 
doi:10.3844/jcssp.2011.849.853 fatcat:wdec53au45cqbdxhptryowpame
« Previous Showing results 1 — 15 out of 56,747 results