一个有效的认证密钥协议

H. Elkamchouchi, Eman F. Abu Elkair
{"title":"一个有效的认证密钥协议","authors":"H. Elkamchouchi, Eman F. Abu Elkair","doi":"10.7763/IJCCE.2013.V2.237","DOIUrl":null,"url":null,"abstract":"Authentication and key establishment are fundamental building blocks for securing electronic communication. Cryptographic algorithm for encryption and integrity cannot perform their function unless secure keys have been established and the users know which parties share such keys. It is essential that protocols for providing and key establishment are fit for their purpose. This paper proposes a new and efficient key establishment protocol in the asymmetric (public key) setting that is based on MTI (Matsumoto, Takashima and Imai)-two pass key agreement protocol which consists of three phases; The Transfer and Verification Phase, and The Key Generation Phase. This protocol is strong against most of potential attacks(Known-Key Security, Forward (Perfect) Secrecy, Key-Compromise Impersonation, Unknown Key-Share Attack, Small Subgroup Attack, and Man-in-the-Middle Attack) with low complexity (complexity is 4), also it provide authentication between the two entities before exchanging the session keys.","PeriodicalId":438638,"journal":{"name":"2011 28th National Radio Science Conference (NRSC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"212","resultStr":"{\"title\":\"An efficient protocol for authenticated key agreement\",\"authors\":\"H. Elkamchouchi, Eman F. Abu Elkair\",\"doi\":\"10.7763/IJCCE.2013.V2.237\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Authentication and key establishment are fundamental building blocks for securing electronic communication. Cryptographic algorithm for encryption and integrity cannot perform their function unless secure keys have been established and the users know which parties share such keys. It is essential that protocols for providing and key establishment are fit for their purpose. This paper proposes a new and efficient key establishment protocol in the asymmetric (public key) setting that is based on MTI (Matsumoto, Takashima and Imai)-two pass key agreement protocol which consists of three phases; The Transfer and Verification Phase, and The Key Generation Phase. This protocol is strong against most of potential attacks(Known-Key Security, Forward (Perfect) Secrecy, Key-Compromise Impersonation, Unknown Key-Share Attack, Small Subgroup Attack, and Man-in-the-Middle Attack) with low complexity (complexity is 4), also it provide authentication between the two entities before exchanging the session keys.\",\"PeriodicalId\":438638,\"journal\":{\"name\":\"2011 28th National Radio Science Conference (NRSC)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"212\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 28th National Radio Science Conference (NRSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.7763/IJCCE.2013.V2.237\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 28th National Radio Science Conference (NRSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7763/IJCCE.2013.V2.237","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 212

摘要

认证和密钥建立是保证电子通信安全的基本组成部分。除非建立了安全密钥,并且用户知道哪些方共享这些密钥,否则用于加密和完整性的加密算法无法发挥其功能。提供和建立密钥的协议必须适合其目的。本文提出了一种新的基于MTI (Matsumoto, Takashima和Imai)的非对称(公钥)设置中高效的密钥建立协议——由三个阶段组成的两道密钥协议;传递和验证阶段,以及密钥生成阶段。该协议对大多数潜在的攻击(已知密钥安全、正向(完美)保密、密钥妥协模拟、未知密钥共享攻击、小子组攻击和中间人攻击)具有较强的防御能力,复杂度较低(复杂度为4),并且在交换会话密钥之前提供两个实体之间的身份验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An efficient protocol for authenticated key agreement
Authentication and key establishment are fundamental building blocks for securing electronic communication. Cryptographic algorithm for encryption and integrity cannot perform their function unless secure keys have been established and the users know which parties share such keys. It is essential that protocols for providing and key establishment are fit for their purpose. This paper proposes a new and efficient key establishment protocol in the asymmetric (public key) setting that is based on MTI (Matsumoto, Takashima and Imai)-two pass key agreement protocol which consists of three phases; The Transfer and Verification Phase, and The Key Generation Phase. This protocol is strong against most of potential attacks(Known-Key Security, Forward (Perfect) Secrecy, Key-Compromise Impersonation, Unknown Key-Share Attack, Small Subgroup Attack, and Man-in-the-Middle Attack) with low complexity (complexity is 4), also it provide authentication between the two entities before exchanging the session keys.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信