A Comparison Study on Key Exchange-Authentication protocol
نویسندگان
چکیده
منابع مشابه
A Comparison Study on Key Exchange-Authentication protocol
A key exchange protocol enables two parties to share a common key for encrypting a large amount of data. Authentication is an essential requirement prior to the key exchange process in order to prevent man-in-the-middle attack. It is important to understand the capabilities and performance of the existing key exchange protocols before employing the protocols in our applications. In this paper, ...
متن کاملKey Exchange with Anonymous Authentication Using DAA-SIGMA Protocol
Anonymous digital signatures such as Direct Anonymous Attestation (DAA) and group signatures have been a fundamental building block for anonymous entity authentication. In this paper, we show how to incorporate DAA schemes into a key exchange protocol between two entities to achieve anonymous authentication and to derive a shared key between them. We propose a modification to the SIGMA key exch...
متن کاملSecurity Analysis of WAPI Authentication and Key Exchange Protocol
Protocol ∗ Liufei Wu1,2 Yuqing Zhang2 FengjiaoWang2 1Communication Engineering Institute,Xidian University,Xi’an 710071 2National Computer Network Intrusion Protection Center,GUCAS, Beijing100049 Abstract We first do an in-depth security analysis of the authenticated key exchange protocol WAI in WAPI (WALN Authentication Privacy Infrastructure), point out its flaws and improve it. Next, we give...
متن کاملA New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card
In today′s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. T...
متن کاملAn Improvement on A Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed threeparty authen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/1161-1459