Asymmetric disribution of computations in Internet Key Exchange Protocol

被引:0
|
作者
Karbasioun, Mohammad Mehdi [1 ]
Berenjkub, Mehdi [2 ]
Taji, Bahareh [2 ]
机构
[1] Islamic Azad Univ, Khomeini Shahr, Iran
[2] Isfahan Univ Technol, Esfahan, Iran
关键词
IKEv2; signature; computations; authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IPsec security mechanism standard offers Internet Key Exchange Protocol (IKEv2) for establishing and managing its secure sessions. In IKEv2 both two participants perform the same amount of calculations in all cases and this would cause some deficiencies, when it is used in different situations with different properties. For example in most of client-server connections it is more preferable for servers to do fewer operations in comparison with clients. In the other side in some connections, initiators are entities with less power of computing when comparing with responders. Mobile users are examples of such entities. In these connections, the initiators are the entities who need to perform fewer operations. To solve this problem, we propose two protocols with asymmetric schemes for distribution the calculations. In proposed protocols, one of the participants performs fewer computations, depending on the properties of connections. To achieve this asymmetric scheme, Schnorr signature scheme is used by the entity needs to perform fewer computations.
引用
下载
收藏
页码:1449 / +
页数:2
相关论文
共 50 条
  • [41] Implementing Internet Key Exchange (IKE)
    Hallqvist, N
    Keromytis, AD
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK, 2000, : 201 - 214
  • [42] IoDseC++: authenticated key exchange protocol for cloud-enable internet of drone communication
    Amin R.
    Jayaswal S.
    Sureshkumar V.
    Rathore B.
    Jha A.
    Abdussami M.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) : 9529 - 9542
  • [43] A secure key exchange protocol for Industrial Internet of Things based on tropical triad matrix semiring
    J. Jackson
    R. Perumal
    International Journal of Information Technology, 2025, 17 (1) : 293 - 300
  • [44] SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things
    Fan, Qing
    Chen, Jianhua
    Shojafar, Mohammad
    Kumari, Saru
    He, Debiao
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6424 - 6434
  • [45] Key Reuse Attack on NewHope Key Exchange Protocol
    Liu, Chao
    Zheng, Zhongxiang
    Zou, Guangnan
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 163 - 176
  • [46] Cryptanalysis of the Dragonfly key exchange protocol
    Clarke, Dylan
    Hao, Feng
    IET INFORMATION SECURITY, 2014, 8 (06) : 283 - 289
  • [47] An unbalanced protocol for group key exchange
    Herranz, J
    Villar, JL
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 172 - 180
  • [48] A Key Exchange Protocol Based on the Ring
    Nasrutdinov, M. F.
    UCHENYE ZAPISKI KAZANSKOGO UNIVERSITETA-SERIYA FIZIKO-MATEMATICHESKIE NAUKI, 2024, 166 (01): : 52 - 57
  • [50] An enhanced authentication key exchange protocol
    Hwang, RJ
    Shiau, SH
    Lai, CH
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 202 - 205