Asymmetric disribution of computations in Internet Key Exchange Protocol

被引:0
|
作者
Karbasioun, Mohammad Mehdi [1 ]
Berenjkub, Mehdi [2 ]
Taji, Bahareh [2 ]
机构
[1] Islamic Azad Univ, Khomeini Shahr, Iran
[2] Isfahan Univ Technol, Esfahan, Iran
关键词
IKEv2; signature; computations; authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IPsec security mechanism standard offers Internet Key Exchange Protocol (IKEv2) for establishing and managing its secure sessions. In IKEv2 both two participants perform the same amount of calculations in all cases and this would cause some deficiencies, when it is used in different situations with different properties. For example in most of client-server connections it is more preferable for servers to do fewer operations in comparison with clients. In the other side in some connections, initiators are entities with less power of computing when comparing with responders. Mobile users are examples of such entities. In these connections, the initiators are the entities who need to perform fewer operations. To solve this problem, we propose two protocols with asymmetric schemes for distribution the calculations. In proposed protocols, one of the participants performs fewer computations, depending on the properties of connections. To achieve this asymmetric scheme, Schnorr signature scheme is used by the entity needs to perform fewer computations.
引用
下载
收藏
页码:1449 / +
页数:2
相关论文
共 50 条
  • [1] An architecture for the Internet Key Exchange Protocol
    Cheng, PC
    IBM SYSTEMS JOURNAL, 2001, 40 (03) : 721 - 746
  • [2] Further analysis of the Internet key exchange protocol
    Zhou, J
    COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1606 - 1612
  • [3] An Internet Key Exchange Protocol Based on Public Key Infrastructure
    朱建明
    马建峰
    Advances in Manufacturing, 2004, (01) : 51 - 56
  • [4] An efficient and secured internet key exchange protocol design
    Su, Ming-Yang
    Chang, Jia-Feng
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 184 - +
  • [5] ESIKE: An Efficient and Secure Internet Key Exchange Protocol
    Marwa Ahmim
    Ahmed Ahmim
    Mohamed Amine Ferrag
    Nacira Ghoualmi-Zine
    Leandros Maglaras
    Wireless Personal Communications, 2023, 128 : 1309 - 1324
  • [6] A Passive Attack Against an Asymmetric Key Exchange Protocol
    Cao, YunFei
    Bai, Jian
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 45 - 48
  • [7] Arcanum: A secure and efficient key exchange protocol for the Internet
    Mian, AS
    Masood, A
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 17 - 21
  • [8] ESIKE: An Efficient and Secure Internet Key Exchange Protocol
    Ahmim, Marwa
    Ahmim, Ahmed
    Ferrag, Mohamed Amine
    Ghoualmi-Zine, Nacira
    Maglaras, Leandros
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (02) : 1309 - 1324
  • [9] Analysis of the Internet key exchange protocol using the NRL protocol analyzer
    Meadows, C
    PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 216 - 231
  • [10] Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
    Meadows, Catherine
    Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1999, : 216 - 231