Read full paper at:
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=53160#.VLXf1snQrzE
http://www.scirp.org/journal/PaperInformation.aspx?PaperID=53160#.VLXf1snQrzE
Affiliation(s)
1Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA.
2Department of Information Systems, Information Security Research Group, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA.
2Department of Information Systems, Information Security Research Group, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA.
ABSTRACT
One
of the most important and challenging cryptographic primitives in
Public Key Cryptography is Key Agreement Protocol where two or more
parties share secret values and establish the session key. Many authors
have proposed key agreement protocols. In this article, we have viewed
some authenticated Key Agreement Protocols and presented a comparative
study. We have also described the design principle, security requirement
and various attacks on Key Agreement Protocol.
Cite this paper
References
Baalghusun, A. , Abusalem, O. , Abbas, Z. and Kar, J. (2015) Authenticated Key Agreement Protocols: A Comparative Study. Journal of Information Security, 6, 51-58. doi: 10.4236/jis.2015.61006.
[1] | Saha, M. and RoyChowdhury, D. (2009) Provably Secure Key Establishment Protocol Using One-Way Functions. Journal of Discrete Mathematical Sciences & Cryptography, 12, 139-158. |
[2] | Menezes, A., van Oorschot, P. and Vanstone, S. (2010) Handbook of Applied Cryptography. CRC Press, Boca Raton. |
[3] | Vesterås, B. (2006) Analysis of Key Agreement Protocols, 1-46. |
[4] | Dutta, R. and Barua, R. (2005) Overview of Key Agreement Protocols. Cryptology ePrint Archive, 1-46. |
[5] | Diffie, W. and Hellman, M. (1976) New Directions in Cryptography. IEEE Transaction on Information Theory, 22, 644-654. http://dx.doi.org/10.1109/TIT.1976.1055638 |
[6] | Mohamed, N., Yasmine, A., Galal, E. and Amr, A. (2013) New Authenticated Key Agreement Protocols. International Multi Conference of Engineering and Computer Scientists, 1, 58-63 |
[7] | Elkamchouchi, H.M., Saleh, Y.A. and Sary, A.M. (2011) New Authenticated Key Agreement Protocols. International Conference on Computer Engineering & Systems (ICCES), Cairo, 29 November 2011-1 December 2011, 58-63. |
[8] | Boyd, C. and Mathuria, A. (2003) Protocols for Authentication and Key Establishment. Springer, Berlin, Heidelberg. |
[9] | Lopez, J. and Dahab, R. (2000) An Overview of Elliptic Curve Cryptography. Technical report, Institute of Computing, State University of Campinas, Brazil, 1-35. |
[10] | Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, Taiwan, 16, 26-36. |
[11] | Harn, L., Hsin, W.J. and Mehta, M. (2005) Authenticated Diffie-Hellman Key Agreement Protocol Using a Single Cryptographic Assumption. IEEE Proceeding of Communication, 152, 404-410. |
[12] | Wen,
H.A., Lin, C.L. and Hwang, T. (2006) Provably Secure Authenticated Key
Exchange Protocols for Low Power Computing Clients. Computer &
Security, 25, 106-113. http://dx.doi.org/10.1016/j.cose.2005.09.010 |
[13] | Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456. |
[14] | Popescu, C. (2004) A Secure Authenticate Key Agreement Protocol. IEEE MELECON, Mediterranean, 12-15 May 2004, 783-786. |
[15] | Tseng,
Y.M. (2005) Efficient Authenticated Key Agreement Protocols Resistant
to a Denial-of-Service Attack. International Journal of Network
Management, 15, 193-202. http://dx.doi.org/10.1002/nem.561 |
[16] | Yoon, E.J. and Yoo, K.Y. (2005) New Efficient Simple Authenticated Key Agreement Protocol. Computing and Combinatorics, 3595, 945-954. http://dx.doi.org/10.1007/11533719_95 |
[17] | Nabil, M., Abouelseoud, Y., Elkobrosy, G. and Abdelrazek, A. (2013) Certificate-Based Authenticated Key Agreement Protocols. Proceeding of IEEE ICCAT, Computer Applications Technology (ICCAT), 2013 International Conference on Location City of Sousse, 20-22 January 2013, 1-7. eww150114lx |
[18] | Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88. |
评论
发表评论