Filters








40 Hits in 6.9 sec

Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip

Roshan Duraisamy, Zoran Salcic, MaurizioAdriano Strangio, Miguel Morales-Sandoval
2007 EURASIP Journal on Embedded Systems  
The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure  ...  and a networked embedded system, to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme (AES).  ...  key by a chosen base point on the curve.  ... 
doi:10.1186/1687-3963-2007-065751 fatcat:mm23sxrjpjd73hts75dpcdeygi

Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip

Roshan Duraisamy, Zoran Salcic, Maurizio Adriano Strangio, Miguel Morales-Sandoval
2007 EURASIP Journal on Embedded Systems  
The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure  ...  and a networked embedded system, to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme (AES).  ...  key by a chosen base point on the curve.  ... 
doi:10.1155/2007/65751 fatcat:zaa4nt7vp5dhvic2lrcgzsozky

A Certificateless Authenticated Key Agreement Scheme for the Power IoT

Wenchao Cui, Rui Cheng, Kehe Wu, Yuling Su, Yuqing Lei
2021 Energies  
Therefore, the paper proposes a novel authenticated key agreement scheme based on the certificateless public key cryptography (CL-PKC) mechanism.  ...  Finally, the implementation of the authenticated key agreement protocol is given based on the actual application requirement of the power IoT, and the analysis and comparison of the simulation demonstrates  ...  ., proposed a very reliable and secure authenticated key agreement protocol with pairing-free based on CL-PKC.  ... 
doi:10.3390/en14196317 fatcat:b6oqmnnmejdh5cqbtroitffrby

Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles

Shehzad Ashraf Chaudhry, Prosanta Gope
2021 Security and Communication Networks  
Based on secure symmetric lightweight hash functions and encryption operations, the proposed SMEP-IoV meets IoV security and performance requirements.  ...  Therefore, a secure message authentication protocol is proposed in this study for information exchange among entities of IoV (SMEP-IoV).  ...  Prosanta Gope for valuable suggestions to improve the quality, correctness, presentation, and readability of the manuscript.  ... 
doi:10.1155/2021/5554318 fatcat:aaq2nyuuubedlpkgawdwdtmnq4

A Prototype Model of Virtual Authenticated Key Exchange Mechanism over Secured Channel in Ad-Hoc Environment

2020 International journal of recent technology and engineering  
Key exchange protocols play a vital role in symmetric key cryptography.  ...  The existing key exchange protocols such as Diffie-Hellman, Elgamal, and MQV, etc. are the old methods and many attacks happened on those protocols.  ...  Wu et al [10] suggest a new session-based protocol named ID-CL-eCK that is an identity-based authenticated key exchange and this is the advancement of LR-ID-AKE.  ... 
doi:10.35940/ijrte.e6684.018520 fatcat:nsmk3n2yfzghrcochqtepbjugq

One-round key exchange in the standard model

Colin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson
2009 International Journal of Applied Cryptography  
The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting.  ...  2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. Abstract. We consider one-round key exchange protocols secure in the standard model.  ...  By modifying these to operate in the setting of asymmetric pairings and ordinary elliptic curves, we are able to produce concrete ID-based protocols with security proven in the standard model that are  ... 
doi:10.1504/ijact.2009.023466 fatcat:vkwc7duhwnfrzhnjjm3etxpa6y

Security Protocols in a Nutshell [article]

Mohsen Toorani
2016 arXiv   pre-print
Furthermore, a survey on computational security models for authenticated key exchange (AKE) and password-authenticated key exchange (PAKE) protocols, as the most important and well-studied type of security  ...  It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of protocols.  ...  Acknowledgment The author would like to thank Øyvind Ytrehus for helpful comments and discussions.  ... 
arXiv:1605.09771v2 fatcat:mkbc3in6tvdo7madnvqaxogbfq

Smart Contract-Based Cross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks

Guangsong Li, Yang Wang, Bin Zhang, Siqi Lu
2020 Mobile Information Systems  
In this paper, we propose a cross-domain authentication and key agreement system based on smart contract of blockchains.  ...  On this basis, a cross-domain authentication and key agreement protocol is designed.  ...  Traditionally, in cross-domain authentication solutions, there are two main frameworks. One is based on the symmetric key scheme such as Mahshid and Eslamipoor [3] .  ... 
doi:10.1155/2020/2964562 fatcat:2gbljxcoczgmllymgvbpagu4qa

A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems

Bander A. Alzahrani, Ahmed Barnawi, Shehzad Ashraf Chaudhry, Helena Rifà-Pous
2021 Security and Communication Networks  
In this article, we present a symmetric key primitive-based scheme and provide authentication among a user and a UAV through an intermediate control center.  ...  Due to usage of symmetric key and elliptic curve cryptography, the proposed scheme fulfils the performance requirements of the UAVs.  ...  On receiving ID j , PID j , Key j , H(.) 􏽮 􏽯, Dr j stores the pair in its memory. Login and Authentication.  ... 
doi:10.1155/2021/3437373 fatcat:imwvisf4zbh23kncye3bzwbgme

Forsakes: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes

Rasool Jalili, Mohammad Sadeq Dousti
2015 Advances in Mathematics of Communications  
This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) protocols, which can be satisfied without depending on the Diffie-Hellman assumption.  ...  Some of these settings are as follows: Two-party setting, three-party setting, publickey setting, group key exchange, and password-based AKE. We survey these settings in Section 1.2.  ...  Notice that [35] modeled the two-party authentication/AKE based on symmetric keys. The present paper uses a similar model.  ... 
doi:10.3934/amc.2015.9.471 fatcat:cgsqkpprhvf77i5cwyvofsejya

Strongly Secure Certificateless Key Agreement [chapter]

Georg Lippold, Colin Boyd, Juan Gonzalez Nieto
2009 Lecture Notes in Computer Science  
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols.  ...  Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security.  ...  Asymmetric pairings are not possible because we use the noninteractive ID-based key agreement of Sakai, Ohgishi and Kasahara (SOK) [SOK00] as part of our protocol.  ... 
doi:10.1007/978-3-642-03298-1_14 fatcat:7mia5g3bw5dopksrbqopvti5ni

On Post-compromise Security

Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
2016 2016 IEEE 29th Computer Security Foundations Symposium (CSF)  
At a technical level, we instantiate our informal definitions in the setting of authenticated key exchange (AKE) protocols, and develop two new strong security models for two different threat models.  ...  Our work leads to crucial insights on how postcompromise security can (and cannot) be achieved, paving the way for applications in other domains.  ...  This applies broadly to protocols with different security models, including authenticated key exchange and messaging.  ... 
doi:10.1109/csf.2016.19 dblp:conf/csfw/Cohn-GordonCG16 fatcat:bl75n4itnnh3ba2eh5cckhnmxa

He hears, she hears: Are there sex differences in auditory processing?

Kathleen M. Yoder, Mimi L. Phan, Kai Lu, David S. Vicario
2014 Developmental Neurobiology  
the course of cryptography.1 0 4 This key system differs fundamentally from the symmetric algorithm. 1 0 5 The asymmetric algorithm uses a public key and a 106 private key to encrypt and decrypt messages  ...  94 There are two types of key based encryption/decryption algorithms. 95 The S96 . • 97 first is secret-key cryptography, also called a symmetric algorithm.  ... 
doi:10.1002/dneu.22231 pmid:25220950 pmcid:PMC4324369 fatcat:gijjzthygzg7bnck7dqywahsde

Zero-Communication Seed Establishment for Anti-Jamming Techniques

Kim Pecina, Esfandiar Mohammadi, Christina Pöpper
2014 Proceedings 2014 Workshop on Security of Emerging Networking Technologies   unpublished
Drawing on powerful identity-based (ID-based) cryptography and exploiting a-priori knowledge about the identities of the communication partners, the parties can immediately and without any communication  ...  Even without a-priori knowledge, our scheme still benefits from the certificate-free authentication offered by ID-based cryptography.  ...  This work was supported by the German Ministry for Education and Research (BMBF) through funding for the Center for IT-Security, Privacy and Accountability (CISPA).  ... 
doi:10.14722/sent.2014.23004 fatcat:23gfw6olarafjh5w767fq2i3bq

Efficient One-Round Key Exchange in the Standard Model [chapter]

Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson
Lecture Notes in Computer Science  
We consider one-round key exchange protocols secure in the standard model.  ...  The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting.  ...  By modifying these to operate in the setting of asymmetric pairings and ordinary elliptic curves, we are able to produce concrete ID-based protocols with security proven in the standard model that are  ... 
doi:10.1007/978-3-540-70500-0_6 fatcat:cymsjctlx5hdxb4nfvwjcq5g3i
« Previous Showing results 1 — 15 out of 40 results