35,189 Hits in 5.4 sec

Security of Public Key Certificate Based Authentication Protocols [chapter]

Wu Wen, Takamichi Saito, Fumio Mizoguchi
2000 Lecture Notes in Computer Science  
The security of authentication protocols based on public key cryptography depends on the validity of the certificate.  ...  This paper describes an attack that exploits this certificate validity weakness and breaks some well-known certificate-based authentication protocols, namely the SSL and the TLS protocol.  ...  The security of the system is then considered restored. Could this be said of the public key certificate based authentication protocols?  ... 
doi:10.1007/978-3-540-46588-1_14 fatcat:rn2kbj2nrvd4jomnkhmd22n2e4

Mutual Authentication and Session Key Establishment for Secure Communication using Generalized Digital Certificate

Balaji V Durgawad, Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdul Sattar
2017 International Journal of Computer Network and Information Security  
Public-key digital certificates are being used in public key infrastructure to provide authentication of the user's public key.  ...  Public key digital certificates like X.509 are used to bind a public key to its user. This kind of certificates cannot be used for user authentication.  ...  "X.509" is an example of public key digital certificate [1] . In PKI X.509 certificate is widely used to provide authentication of Certificate holder's public key.  ... 
doi:10.5815/ijcnis.2017.08.04 fatcat:2t73wxypjnb43kh6qv5vznmh3y

Securing Wireless Sensors in Military Applications through Resilient Authentication Mechanism

Usha Jain, Muzzammil Hussain
2020 Procedia Computer Science  
In WSNs, a node is preloaded with the base station's public key at the time of deployment; it requests and acquires its certificate from the base station and is later used for mutual authentication by  ...  In WSNs, a node is preloaded with the base station's public key at the time of deployment; it requests and acquires its certificate from the base station and is later used for mutual authentication by  ...  of node B and decrypts the certificate using the base station's public key (PUBS).  ... 
doi:10.1016/j.procs.2020.04.078 fatcat:jdzbzh3lnzb4nfdu6z23n35iou

Comments on an optimized protocol for mobile network authentication and security

Keith M. Martin, Chris J. Mitchell
1999 ACM SIGMOBILE Mobile Computing and Communications Review  
In [3] a protocol was described for providing "mutual authentication" and "key distribution" between a mobile user and a base station by means of the exchange of public key certificates.  ...  Setting aside the precise certificate design, the "mutual authentication and key distribution protocol" of [3] involves a very simple exchange of public key certificates.  ...  We conclude that the achievements of the protocol proposed in [3] seem rather limited with regards to network authentication and security.  ... 
doi:10.1145/584027.584036 fatcat:2gnlrsf2pbaf5aayecx34sccoy

Energy-Efficient Mutual Authentication Protocol for Handhled Devices Based on Public Key Cryptography

Wilayat Khan, Habib Ullah, Riaz Hussain
2013 Journal of clean energy technologies  
Many authentication protocols based on symmetric or asymmetric cryptography has been proposed.  ...  In this paper, we propose enhancements to the existing asymmetric authentication protocol based on FIPS 196 standards.  ...  The protocol requires the existence of a Certification Authority (CA) in the mobile networks to create public key certificates for mobile users and base stations.  ... 
doi:10.7763/ijcte.2013.v5.790 fatcat:fufze3dhzra2dgp24q3gr2h5my

An Efficient Key Management Solution for Personal Network Federations

Shahab Mirzadeh, Haitham Cruickshank, Rahim Tafazolli
2008 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies  
In this paper, we provide security mechanisms and protocols for key exchange and key management in PN Federations and specify how the established keys can be used to secure communications in different  ...  Security and privacy is one of the major concerns in the development and acceptance of PN-F like collaborative networks and as any other security architecture, the key management is the corner stone of  ...  In this case, PN-F participants' mutual authentication and security association establishment is based on PNCA certificate and will be done through the standard public-key-based key exchange protocol such  ... 
doi:10.1109/ubicomm.2008.15 fatcat:nn3gia3x35bndoip75ggafhuke

A new two-round certificateless authenticated key agreement protocol without bilinear pairings

Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang, Weiwei Han
2011 Mathematical and computer modelling  
Certificateless public key cryptography simplifies the complex certificate management in the traditional public key cryptography and resolves the key escrow problem in identity-based cryptography.  ...  We also show the proposed protocol is secure in the random oracle model.  ...  Hence, the problem of certificate management arises. To solve the problem, Shamir [1] defined a new public key cryptography called identity-based public key cryptography.  ... 
doi:10.1016/j.mcm.2011.08.004 fatcat:2nxbonggorg4pf72auvjdjdog4

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things.  ...  INDEX TERMS Authentication, Internet of Things, key bootstrapping, key management, public key cryptography, security.  ...  mode: in this security mode, devices use authentication based on public keys, while without being part of a public-key infrastructure.  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Using ID-based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure

Shaik Mullapathi Farooq, S. M. Suhail Hussain, Taha Selim Ustun, Atif Iqbal
2020 IEEE Access  
CERTIFICATE-BASED AUTHENTICATION SCHEME FOR SECURING COMMUNICATION IN AMI Certificate based mechanism using Public Key Infrastructure (PKI) ensures authentication and eliminates many security attacks.  ...  ID-BASED AUTHENTICATION KEY AGREEMENT PROTOCOL The proposed ID-based authentication key agreement protocol has three phases: 1) Setup, 2) Key generation and 3) Key agreement. iii.  ... 
doi:10.1109/access.2020.3038813 fatcat:aqvaty4gbvf7pk2ttvtf6ubezq

A Novel Methodology for Secure Communications and Prevention of Forgery Attacks

M. V.Kishore, G. Pandit Samuel, N. Aditya Sundar, M. Enayath Ali, Y. Lalitha Varma
2014 International Journal of Computer Applications  
The advantage of GDC is that, unlike the public key Digital Certificate, it does not contain user's public key.  ...  Public key Digital certificate though gained popularity in the public key infrastructure (PKI) in providing authentication to user public key, itself cannot be used to safeguard an authenticate user.  ...  METHODOLOGY 1) Implementation of DL-based Protocol: a) Prologue There is a pitfall Public-Key Digital Certificate that is it alone cannot safeguard and provide authentication to user's public key due  ... 
doi:10.5120/16924-6762 fatcat:2yka5glzijh4lfzjg47deo2cxq

Personal security agent

Qi He, Katia P. Sycara, Timothy W. Finin
1998 Proceedings of the second international conference on Autonomous agents - AGENTS '98  
PKI (Public Key Infrastructure), which issues and provides access to public key certificates to preserve the integrity of a public key, is fundamental for electronic commerce and business across the Internet  ...  In this paper, we present two aspects of KQML-based PKI: 1. the security agent concept and its functional modules; 2. an extension of KQML, which is needed for public key management and secure communications  ...  However, like the applications of public key cryptosystem in human society, without a scalable authentication service, all of security schemes and protocols designed for open agent society cannot make  ... 
doi:10.1145/280765.280865 dblp:conf/agents/HeSF98 fatcat:knm3dp5a6ja2tn2cmmwf2u3ry4

Network-Specific Attacks on Diffie-Hellman Key-Exchange in Commercial Protocols

Iraj Fathirad, John Devlin, Sepidehsadat Atshani
2016 Journal of clean energy technologies  
Public-key cryptography was a revolution in cyber security key administration and enabled peers to dynamically create keys for each cryptographic session.  ...  Defending against these attacks is important in secure implementation of DH in network protocols.  ...  ACKNOWLEDGMENT The authors are thankful to the anonymous referees for their careful reading and valuable comments that have improved the quality of the paper  ... 
doi:10.7763/ijcte.2016.v8.1031 fatcat:jhiuhx7uyrhq7miv34akyszeou

User authentication scheme based on self-certified public-key for next generation wireless network

Dake He, Jianbo Wang, Yu Zheng
2008 2008 International Symposium on Biometrics and Security Technologies  
Index Terms -Security of Wireless network, Authentication, Self-certified public-key, 4G wireless network.  ...  In this paper, a AKA scheme (SPAKA) based on self-certified public-key is proposed for the coming 4G system to reduce the storage, computation and communicational load of existing public-key based user  ...  of public-key based methods.  ... 
doi:10.1109/isbast.2008.4547638 fatcat:jg7mp2gugncv3po667x2ai4w7y

Identity-based protocol design patterns for machine-to-machine secure channels

Francisco Corella, Karen P. Lewison
2014 2014 IEEE Conference on Communications and Network Security  
We describe a range of alternative protocol design patterns that use identity-based encryption to eliminate roundtrips and certificate transmission.  ...  In the classical design pattern for secure channel protocols, there is a first phase where the endpoints establish a shared secret and one or both endpoints authenticate by presenting a certificate and  ...  Some protocols allow the use of an uncertified key pair instead of a certificate and its associated private key for authentication of one or both endpoints.  ... 
doi:10.1109/cns.2014.6997471 dblp:conf/cns/CorellaL14 fatcat:pc5ak2zqzfgaxnwpnwwlhoxqvi

Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications

Lein Harn, Jian Ren
2011 IEEE Transactions on Wireless Communications  
However, the public-key digital certificate itself cannot be used as a security factor to authenticate user.  ...  Based on this concept, we propose both discrete logarithm (DL)-based and integer factoring (IF)-based protocols that can achieve user authentication and secret key establishment.  ...  IF-BASED PROTOCOL In this section, we propose an IF-based user authentication and key establishment protocol.  ... 
doi:10.1109/twc.2011.042211.101913 fatcat:snjn3pk42rdkjdkh2nubujxfa4
« Previous Showing results 1 — 15 out of 35,189 results