A Comparison Study on Key Exchange-Authentication protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparison Study on Key Exchange-Authentication protocol

A key exchange protocol enables two parties to share a common key for encrypting a large amount of data. Authentication is an essential requirement prior to the key exchange process in order to prevent man-in-the-middle attack. It is important to understand the capabilities and performance of the existing key exchange protocols before employing the protocols in our applications. In this paper, ...

متن کامل

Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol

Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, we show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared key between them. We propose a modification to the SIGMA key exch...

متن کامل

Security Analysis of WAPI Authentication and Key Exchange Protocol

Protocol ∗ Liufei Wu1,2 Yuqing Zhang2 FengjiaoWang2 1Communication Engineering Institute,Xidian University,Xi’an 710071 2National Computer Network Intrusion Protection Center,GUCAS, Beijing100049 Abstract We first do an in-depth security analysis of the authenticated key exchange protocol WAI in WAPI (WALN Authentication Privacy Infrastructure), point out its flaws and improve it. Next, we give...

متن کامل

A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card

In today′s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. T...

متن کامل

An Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography

The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed threeparty authen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2010

ISSN: 0975-8887

DOI: 10.5120/1161-1459