A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security of Public Key Certificate Based Authentication Protocols
[chapter]
2000
Lecture Notes in Computer Science
The security of authentication protocols based on public key cryptography depends on the validity of the certificate. ...
This paper describes an attack that exploits this certificate validity weakness and breaks some well-known certificate-based authentication protocols, namely the SSL and the TLS protocol. ...
The security of the system is then considered restored. Could this be said of the public key certificate based authentication protocols? ...
doi:10.1007/978-3-540-46588-1_14
fatcat:rn2kbj2nrvd4jomnkhmd22n2e4
Mutual Authentication and Session Key Establishment for Secure Communication using Generalized Digital Certificate
2017
International Journal of Computer Network and Information Security
Public-key digital certificates are being used in public key infrastructure to provide authentication of the user's public key. ...
Public key digital certificates like X.509 are used to bind a public key to its user. This kind of certificates cannot be used for user authentication. ...
"X.509" is an example of public key digital certificate [1] . In PKI X.509 certificate is widely used to provide authentication of Certificate holder's public key. ...
doi:10.5815/ijcnis.2017.08.04
fatcat:2t73wxypjnb43kh6qv5vznmh3y
Securing Wireless Sensors in Military Applications through Resilient Authentication Mechanism
2020
Procedia Computer Science
In WSNs, a node is preloaded with the base station's public key at the time of deployment; it requests and acquires its certificate from the base station and is later used for mutual authentication by ...
In WSNs, a node is preloaded with the base station's public key at the time of deployment; it requests and acquires its certificate from the base station and is later used for mutual authentication by ...
of node B and decrypts the certificate using the base station's public key (PUBS). ...
doi:10.1016/j.procs.2020.04.078
fatcat:jdzbzh3lnzb4nfdu6z23n35iou
Comments on an optimized protocol for mobile network authentication and security
1999
ACM SIGMOBILE Mobile Computing and Communications Review
In [3] a protocol was described for providing "mutual authentication" and "key distribution" between a mobile user and a base station by means of the exchange of public key certificates. ...
Setting aside the precise certificate design, the "mutual authentication and key distribution protocol" of [3] involves a very simple exchange of public key certificates. ...
We conclude that the achievements of the protocol proposed in [3] seem rather limited with regards to network authentication and security. ...
doi:10.1145/584027.584036
fatcat:2gnlrsf2pbaf5aayecx34sccoy
Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography
2013
Journal of clean energy technologies
Many authentication protocols based on symmetric or asymmetric cryptography has been proposed. ...
In this paper, we propose enhancements to the existing asymmetric authentication protocol based on FIPS 196 standards. ...
The protocol requires the existence of a Certification Authority (CA) in the mobile networks to create public key certificates for mobile users and base stations. ...
doi:10.7763/ijcte.2013.v5.790
fatcat:fufze3dhzra2dgp24q3gr2h5my
An Efficient Key Management Solution for Personal Network Federations
2008
2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
In this paper, we provide security mechanisms and protocols for key exchange and key management in PN Federations and specify how the established keys can be used to secure communications in different ...
Security and privacy is one of the major concerns in the development and acceptance of PN-F like collaborative networks and as any other security architecture, the key management is the corner stone of ...
In this case, PN-F participants' mutual authentication and security association establishment is based on PNCA certificate and will be done through the standard public-key-based key exchange protocol such ...
doi:10.1109/ubicomm.2008.15
fatcat:nn3gia3x35bndoip75ggafhuke
A new two-round certificateless authenticated key agreement protocol without bilinear pairings
2011
Mathematical and computer modelling
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography. ...
We also show the proposed protocol is secure in the random oracle model. ...
Hence, the problem of certificate management arises. To solve the problem, Shamir [1] defined a new public key cryptography called identity-based public key cryptography. ...
doi:10.1016/j.mcm.2011.08.004
fatcat:2nxbonggorg4pf72auvjdjdog4
A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things
2019
IEEE Access
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things. ...
INDEX TERMS Authentication, Internet of Things, key bootstrapping, key management, public key cryptography, security. ...
mode: in this security mode, devices use authentication based on public keys, while without being part of a public-key infrastructure. ...
doi:10.1109/access.2019.2900957
fatcat:fbpg4ydg55bg5okyljo67hycqq
Using ID-based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure
2020
IEEE Access
CERTIFICATE-BASED AUTHENTICATION SCHEME FOR SECURING COMMUNICATION IN AMI Certificate based mechanism using Public Key Infrastructure (PKI) ensures authentication and eliminates many security attacks. ...
ID-BASED AUTHENTICATION KEY AGREEMENT PROTOCOL The proposed ID-based authentication key agreement protocol has three phases: 1) Setup, 2) Key generation and 3) Key agreement. iii. ...
doi:10.1109/access.2020.3038813
fatcat:aqvaty4gbvf7pk2ttvtf6ubezq
A Novel Methodology for Secure Communications and Prevention of Forgery Attacks
2014
International Journal of Computer Applications
The advantage of GDC is that, unlike the public key Digital Certificate, it does not contain user's public key. ...
Public key Digital certificate though gained popularity in the public key infrastructure (PKI) in providing authentication to user public key, itself cannot be used to safeguard an authenticate user. ...
METHODOLOGY
1) Implementation of DL-based Protocol: a) Prologue There is a pitfall Public-Key Digital Certificate that is it alone cannot safeguard and provide authentication to user's public key due ...
doi:10.5120/16924-6762
fatcat:2yka5glzijh4lfzjg47deo2cxq
Personal security agent
1998
Proceedings of the second international conference on Autonomous agents - AGENTS '98
PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public key, is fundamental for electronic commerce and business across the Internet ...
In this paper, we present two aspects of KQML-based PKI: 1. the security agent concept and its functional modules; 2. an extension of KQML, which is needed for public key management and secure communications ...
However, like the applications of public key cryptosystem in human society, without a scalable authentication service, all of security schemes and protocols designed for open agent society cannot make ...
doi:10.1145/280765.280865
dblp:conf/agents/HeSF98
fatcat:knm3dp5a6ja2tn2cmmwf2u3ry4
Network-Specific Attacks on Diffie-Hellman Key-Exchange in Commercial Protocols
2016
Journal of clean energy technologies
Public-key cryptography was a revolution in cyber security key administration and enabled peers to dynamically create keys for each cryptographic session. ...
Defending against these attacks is important in secure implementation of DH in network protocols. ...
ACKNOWLEDGMENT The authors are thankful to the anonymous referees for their careful reading and valuable comments that have improved the quality of the paper ...
doi:10.7763/ijcte.2016.v8.1031
fatcat:jhiuhx7uyrhq7miv34akyszeou
User authentication scheme based on self-certified public-key for next generation wireless network
2008
2008 International Symposium on Biometrics and Security Technologies
Index Terms -Security of Wireless network, Authentication, Self-certified public-key, 4G wireless network. ...
In this paper, a AKA scheme (SPAKA) based on self-certified public-key is proposed for the coming 4G system to reduce the storage, computation and communicational load of existing public-key based user ...
of public-key based methods. ...
doi:10.1109/isbast.2008.4547638
fatcat:jg7mp2gugncv3po667x2ai4w7y
Identity-based protocol design patterns for machine-to-machine secure channels
2014
2014 IEEE Conference on Communications and Network Security
We describe a range of alternative protocol design patterns that use identity-based encryption to eliminate roundtrips and certificate transmission. ...
In the classical design pattern for secure channel protocols, there is a first phase where the endpoints establish a shared secret and one or both endpoints authenticate by presenting a certificate and ...
Some protocols allow the use of an uncertified key pair instead of a certificate and its associated private key for authentication of one or both endpoints. ...
doi:10.1109/cns.2014.6997471
dblp:conf/cns/CorellaL14
fatcat:pc5ak2zqzfgaxnwpnwwlhoxqvi
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications
2011
IEEE Transactions on Wireless Communications
However, the public-key digital certificate itself cannot be used as a security factor to authenticate user. ...
Based on this concept, we propose both discrete logarithm (DL)-based and integer factoring (IF)-based protocols that can achieve user authentication and secret key establishment. ...
IF-BASED PROTOCOL In this section, we propose an IF-based user authentication and key establishment protocol. ...
doi:10.1109/twc.2011.042211.101913
fatcat:snjn3pk42rdkjdkh2nubujxfa4
« Previous
Showing results 1 — 15 out of 35,189 results