Filters








679 Hits in 6.2 sec

Forsakes: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes

Rasool Jalili, Mohammad Sadeq Dousti
2015 Advances in Mathematics of Communications  
Forward security, also called perfect forward secrecy (PFS), is an important property of AKE protocols.  ...  This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending on the Diffie-Hellman assumption.  ...  In Section 4, we put forward our new security model and definition for AKE protocols with a symmetric key-evolving scheme.  ... 
doi:10.3934/amc.2015.9.471 fatcat:cgsqkpprhvf77i5cwyvofsejya

Forward Secrecy and Its Application to Future Mobile Communications Security [chapter]

DongGook Park, Colin Boyd, Sang-Jae Moon
2000 Lecture Notes in Computer Science  
Perfect forward secrecy, one of the possible security features provided by key establishment protocols, concerns dependency of a session key upon long-term secret keys (symmetric or asymmetric).  ...  The security protocol in a prominent future mobile system, UMTS, was originally designed without any consideration of perfect forward secrecy.  ...  In fact Günther used the term perfect forward secrecy; however since the word 'perfect' has connotations with unconditional security which are not relevant here, we will use the simpler term in common  ... 
doi:10.1007/978-3-540-46588-1_29 fatcat:ued7ezac5rd57l3pl5zwyrgghq

A Modern View on Forward Security

Colin Boyd, Kai Gellert
2020 Computer journal  
Such a form of security is regarded as increasingly important in the modern world due to the existence of adversaries with mass storage capabilities and powerful infiltration abilities.  ...  Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past.  ...  If the session key was used to provide message authenticity in the session, then forward authenticity is automatically provided if the session key is set up in a key exchange protocol with forward secrecy  ... 
doi:10.1093/comjnl/bxaa104 fatcat:4rmqca3iabh2plsmjif7ai25je

An Improved Authentication Key Exchange Protocol Based on ECDH for WSNs [article]

Sina Baghbanijam
2021 arXiv   pre-print
In this paper we analyze the protocol suggested by Moghadam et al. which is based on ECDH (elliptic-curve Diffie-Hellman) and mention some of the flaws in their proposed authentication and key exchange  ...  Wide-spread use of wireless sensor networks (WSNs) that are consisted of resource-constrained sensor nodes in communication with gateways in sensitive and mission-critical industries have highlighted the  ...  Perfect forward secrecy and resistance to privileged insider attack is provided by utilizing random parameter z when sharing SK with the user and utilizing random parameter b respectively.  ... 
arXiv:2109.11450v1 fatcat:s5ccev6g3rfcvou2n2saex2nui

Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets [article]

Itzel Vazquez Sandoval, Arash Atashpendar, Gabriele Lenzini
2020 arXiv   pre-print
possibility of post-quantum security as well as facilitating forward secrecy and deniability in a primarily symmetric-key setting.  ...  key exchange (PAKE).  ...  Moreover, a PQsecure PAKE can be combined with the recent symmetric-key authenticated key exchange (SAKE) by (Avoine et al., 2020) that provides PFS to obtain an efficient, PQ-secure and primarily symmetric  ... 
arXiv:2005.10787v1 fatcat:kklmfbpwbjaatlry4flcimkh4m

A Novel Two-party Scheme against Off-line Password Guessing Attacks using New Theorem of Chaotic maps

2017 KSII Transactions on Internet and Information Systems  
Compared with the related literatures recently, our proposed scheme can be not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy  ...  For the sake of brevity and readability, only a two-party instance: a novel Two-party Password-Authenticated Key Agreement Protocol is proposed for resisting password guess attack in this work.  ...  Proposition 10 The proposed scheme could have perfect forward secrecy.  ... 
doi:10.3837/tiis.2017.12.027 fatcat:aafb7me555dtrhl7evljtrrdt4

ENHANCED VERIFIER-BASED PASSWORD AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE-PARTIES

Dina Nabil Shaban, Maged H. Ibrahim, Zaki B.Nossair
2008 JES. Journal of Engineering Sciences  
Our proposed protocol is secure against several attacks and provides perfect forward secrecy.  ...  In the three-party setting each user only shares a password with a trusted server which authenticates two users and helps the users with different passwords share a common session key.  ...  The proposed protocol is preventing various attacks and provides the perfect forward secrecy.  ... 
doi:10.21608/jesaun.2008.119612 fatcat:3x62g2yip5b4xnea3hoacmhki4

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels [chapter]

Ran Canetti, Hugo Krawczyk
2001 Lecture Notes in Computer Science  
(i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as defined  ...  We exemplify the usability of our results by applying them to obtain the proof of two classes of key-exchange protocols, Diffie-Hellman and key-transport, authenticated via symmetric or asymmetric techniques  ...  of perfect forward secrecy (see Section 3.2).  ... 
doi:10.1007/3-540-44987-6_28 fatcat:3dgqlk7rmzh6hgair42kimnwbm

Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security

Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xiaoming Fu
2006 Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications  
The results for different key exchange mechanisms are comparatively studied and the design choices of pre-shared key based key exchange mechanisms have been validated.  ...  In this paper, we present a systematic analysis and performance comparison between the pre-shared key exchange mechanisms and the standard public key exchange mechanisms in TLS.  ...  PRE-SHARED KEY EXCHANGE MECHANISMS Pre-shared key exchange mechanisms for TLS protocol are proposed in [4] for the sake of supporting authentication based on pre-shared symmetric keys.  ... 
doi:10.1109/infocom.2006.52 dblp:conf/infocom/KuoTMF06 fatcat:naxhkw43zbdi7hrcif6k6nr55m

PakeMail: authentication and key management in decentralized secure email and messaging via PAKE [article]

Itzel Vazquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y.A. Ryan
2021 arXiv   pre-print
It also provides cryptographic enhancements including multi-device synchronization and secure secret storage/retrieval, and paves the path for forward secrecy, deniability and post-quantum security.  ...  We conclude with some design and security considerations, followed by future lines of work.  ...  Moreover, the recent symmetric-key authenticated key exchange (SAKE) by Avoine et al. [5] is conjectured to be PQ-secure due to its use of symmetric-key primitives.  ... 
arXiv:2107.06090v1 fatcat:52kswe5h4vh33m5xzsqdsvnq4a

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

S. SHIN, K. KOBARA, H. IMAI
2007 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
words: authenticated key exchange, passwords, on-line and off-line dictionary attacks, RSA, leakage of stored secrets, efficiency, perfect forward secrecy  ...  Both mutual authentication and generation of session keys can be accomplished by an authenticated key exchange (AKE) protocol.  ...  perfect forward secrecy (see Table 2 and 3).  ... 
doi:10.1093/ietfec/e90-a.2.474 fatcat:khnyy2dcxfb6xed4geb4rerjma

An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol

Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang
2017 Information Technology and Control  
In this paper, we focus on the security weaknesses in the Arshad and Ikram's SIP authenticated scheme with Elliptic Curve Cryptography(ECC).  ...  Recently, Arshad and Ikram proposed an enhanced mutual authentication scheme for SIP based on Tasi's scheme.  ...  Perfect forward secrecy Verifying authentication scheme with BAN logic We introduce some notations and logical postulates of BAN logic that we will use in our scheme.  ... 
doi:10.5755/j01.itc.45.4.13401 fatcat:c55kuhrabrd7vkwov53attlkim

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols [chapter]

Matt Blaze
2002 Lecture Notes in Computer Science  
JFK also has a number of novel engineering parameters that permit a variety of trade-offs, most notably the ability to balance the need for perfect forward secrecy against susceptibility to denial-of-service  ...  We describe JFK, a new key exchange protocol, primarily designed for use in the IP Security Architecture. It is simple, efficient, and secure; we sketch a proof of the latter property.  ...  {M } Ke Ka Encryption using symmetric key Ke, followed by MAC authentication with symmetric key Ka of message M .  ... 
doi:10.1007/3-540-45807-7_6 fatcat:jvx4rqip6rhsvdxh42ccddd4la

Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols [chapter]

William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
2002 Lecture Notes in Computer Science  
JFK also has a number of novel engineering parameters that permit a variety of trade-offs, most notably the ability to balance the need for perfect forward secrecy against susceptibility to denial-of-service  ...  We describe JFK, a new key exchange protocol, primarily designed for use in the IP Security Architecture. It is simple, efficient, and secure; we sketch a proof of the latter property.  ...  {M } Ke Ka Encryption using symmetric key Ke, followed by MAC authentication with symmetric key Ka of message M .  ... 
doi:10.1007/3-540-45807-7_5 fatcat:rv2sn7kbdvhf3ilzswgfbhos3u

Efficient, DoS-resistant, secure key exchange for internet protocols

William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
JFK also has a number of novel engineering parameters that permit a variety of trade-offs, most notably the ability to balance the need for perfect forward secrecy against susceptibility to denial-of-service  ...  We describe JFK, a new key exchange protocol, primarily designed for use in the IP Security Architecture. It is simple, efficient, and secure; we sketch a proof of the latter property.  ...  {M } Ke Ka Encryption using symmetric key Ke, followed by MAC authentication with symmetric key Ka of message M .  ... 
doi:10.1145/586110.586118 dblp:conf/ccs/AielloBBIRCK02 fatcat:vjcko6qlsnaklayhb47uoevsae
« Previous Showing results 1 — 15 out of 679 results