New Authenticated Key Agreement Protocols

Mohamed Nabil, Yasmine Abouelseoud, Galal Elkobrosy, Amr Abdelrazek
In this paper, new authenticated key agreement (AKA) protocols are proposed to be used by two entities and three entities in order to establish a common session key between these entities. This key is used later to encrypt the data exchanged between the entities to assure confidentiality over public insecure channels. Authenticated key agreement protocols additionally offer authentication; that is, verifying the identities of the entities involved in the protocol. The security properties of the
more » ... proposed schemes are investigated and this revealed that they resist various attacks that can be mounted against a key agreement protocol promoting their use in practical scenarios such as secure remote access to a shared database.