A Robust Authenticated Key Agreement Protocol

نویسندگان

  • Hyoung-Mok Lee
  • Eun-Kyung Ryu
  • Kee-Won Kim
  • Jae-Min Lee
  • Kee-Young Yoo
چکیده

In this paper, we propose a robust authenticated key agreement protocol in which two communication parties exchange a secret session key and authenticate each other. The protocol can be considered as an improvement of simple authenticated key agreement algorithm (SAKA). However, our protocol is more significant in that it addresses the problem of the off-line password guessing attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants

By its very nature, a non-authenticated multi-party key agreement protocol cannot provide participant and message authentication, so it must rely on an authenticated network channel. This paper presents the inability of two famous multi-party key agreement protocols to withstand malicious participant attacks, even though their protocols are based on the authenticated network channel. This attac...

متن کامل

CJ 04 - 092 . R 2 A robust multi - party key agreement protocol resistant to malicious participants †

By its very nature, a non-authenticated multi-party key agreement protocol cannot provide participant and message authentication, so it must rely on an authenticated network channel. This paper presents the inability of two famous multi-party key agreement protocols to withstand malicious participant attacks, even though their protocols are based on the authenticated network channel. This attac...

متن کامل

A Simple and Robust Biometrics-based One-Time Identity-Password Authenticated Key Agreement Scheme

Authenticated key agreement protocols plays an important role in solving the issues over public internet, it sets up secure scheme to finish authentication of users and confidentiality of information transmission. As we know, more and more authenticated protocols put its heart into efficiency, security and user friendly. Biometrics-based algorithm can make the scheme more high-secure and user h...

متن کامل

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks

We explore authenticated group key agreement in data-sharing Peer-to-Peer networks. We first propose a novel password-based authenticated group key agreement protocol with key confirmation. We present a formal statement of its security in a variant of the Bresson et al. security model adapted for the password-based setting. A discussion of the limitations of our protocol in the case where the g...

متن کامل

Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving

Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. Many chaotic maps based two-party/three-party password authenticated key agreement (2PAKA/3PAKA) schemes have been proposed. Howe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003