A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications

被引:0
|
作者
Abi-Char, Pierre E. [1 ]
Mhamed, Abdallah [1 ]
El-Hassan, Bachar [2 ]
机构
[1] Inst Natl Telecommun, GET, CNRS, UMR 5157, 9 Rue C Fourier, F-91011 Evry, France
[2] Libanese Univ, Fac Engn, Tripoli, Lebanon
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The increasing progress in wireless mobile communication has attracted an important amount of attention on the security issue. To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session key. So far several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a fast and Secure Authenticated Key Agreement (EC-SAKA) protocol based on Elliptic Curve Cryptography. Our proposed protocol provides secure mutual authentication, key establishment and key confirmation over an untrusted network. The new protocol achieves many of the required security and performance properties. It can resist dictionary attacks mounted by either passive or active networks intruders. It can resist Man-In-The Middle attack. It also offers perfect forward secrecy which protects past sessions and passwords against future compromise. In addition, it can resist known-key and resilience to server attack. Our proposed protocol uses ElGamal signature techniques (ECEGS). We show that our protocol meets the above security attributes under the assumption that the elliptic curve discrete logarithm problem is secure. Our proposed protocol offers significantly improved performance in computational and communication load over comparably many authenticated key agreement protocols such as B-SPEKE, SRP AMP PAK-RY PAK-X, SKA, LR-AKE and EC-SRP.
引用
收藏
页码:235 / +
页数:2
相关论文
共 50 条
  • [31] A secure authenticated group key agreement protocol for resource-limited mobile devices
    Tseng, Yuh-Min
    [J]. Computer Journal, 2007, 50 (01): : 41 - 52
  • [32] Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography
    Nimbhorkar, Sonali
    Malik, Latesh
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 824 - 830
  • [33] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [34] Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
    Subrahmanyam, Rolla
    Rekha, N. Rukma
    Rao, Y. V. Subba
    [J]. IEEE ACCESS, 2023, 11 : 45243 - 45254
  • [35] Cross-realm client-to-client password-based authenticated key agreement protocol for mobile devices on elliptic curve cryptosystem
    Wen F.
    Li X.
    Cui S.
    [J]. Journal of Convergence Information Technology, 2011, 6 (05) : 23 - 31
  • [36] ID-based authenticated key agreement for low-power mobile devices
    Choi, KY
    Hwang, JY
    Lee, DH
    Seo, IS
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 494 - 505
  • [37] Attribute-based authenticated key agreement protocol secure in ABeCK model
    Gao, Hai-Ying
    [J]. Ruan Jian Xue Bao/Journal of Software, 2015, 26 (12): : 3183 - 3195
  • [38] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    [J]. 2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [39] A secure authenticated key agreement protocol for application at digital certificat
    Saadatmandan, Javad
    Rahimi, Amirhossein
    [J]. International Journal of Network Security, 2020, 22 (02) : 250 - 256
  • [40] Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments
    Tseng, Yuh-Min
    Huang, Sen-Shan
    You, Meng-Lin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)