{"title":"BRC-KEP:一个安全的生物识别和可逆的基于CA的双方密钥交换协议","authors":"S. Choudhury, A. Kalwar, A. Goswami, M. Bhuyan","doi":"10.1109/IC3.2016.7880203","DOIUrl":null,"url":null,"abstract":"Password-based authenticated key exchange (PAKE) protocol provides secure communication between two parties based on cryptographically agreed session key. But such protocols have one major disadvantage, i.e., it is vulnerable to man-in-the-middle, offline dictionary, and other different types of attacks. In this paper, we present a secure biometric and reversible cellular automaton (RCA) based 2-party key exchange protocol called BRC-KEP. The proposed protocol exploits the features of reversible CA and biometric components of an individual. BRC-KEP performs better in comparison to [6, 8, 10] considering speed and invulnerabilities to most of the known attacks. It can be applied in cloud-based data access through insecure communication channel.","PeriodicalId":294210,"journal":{"name":"2016 Ninth International Conference on Contemporary Computing (IC3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"BRC-KEP: A secure biometric and reversible CA based 2-party key exchange protocol\",\"authors\":\"S. Choudhury, A. Kalwar, A. Goswami, M. Bhuyan\",\"doi\":\"10.1109/IC3.2016.7880203\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Password-based authenticated key exchange (PAKE) protocol provides secure communication between two parties based on cryptographically agreed session key. But such protocols have one major disadvantage, i.e., it is vulnerable to man-in-the-middle, offline dictionary, and other different types of attacks. In this paper, we present a secure biometric and reversible cellular automaton (RCA) based 2-party key exchange protocol called BRC-KEP. The proposed protocol exploits the features of reversible CA and biometric components of an individual. BRC-KEP performs better in comparison to [6, 8, 10] considering speed and invulnerabilities to most of the known attacks. It can be applied in cloud-based data access through insecure communication channel.\",\"PeriodicalId\":294210,\"journal\":{\"name\":\"2016 Ninth International Conference on Contemporary Computing (IC3)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Ninth International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2016.7880203\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Ninth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2016.7880203","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
BRC-KEP: A secure biometric and reversible CA based 2-party key exchange protocol
Password-based authenticated key exchange (PAKE) protocol provides secure communication between two parties based on cryptographically agreed session key. But such protocols have one major disadvantage, i.e., it is vulnerable to man-in-the-middle, offline dictionary, and other different types of attacks. In this paper, we present a secure biometric and reversible cellular automaton (RCA) based 2-party key exchange protocol called BRC-KEP. The proposed protocol exploits the features of reversible CA and biometric components of an individual. BRC-KEP performs better in comparison to [6, 8, 10] considering speed and invulnerabilities to most of the known attacks. It can be applied in cloud-based data access through insecure communication channel.