Security analysis and applications of standard key agreement protocols

被引:0
|
作者
Oh, S [1 ]
Kwak, J [1 ]
Lee, S [1 ]
Won, D [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of cryptographic system,to provide the privacy of transmitted message over network is increasing,gradually. A key agreement protocol is the most important part W establish a secure cryptographic system and the effort to standardize the :key agreement protocols is in rapid progress. In this paper, we study properties and operation of standard key agreement protocols and analyze the security of their protocols under several active attacker models such as active impersonation, key-compromised impersonation, (full/half) forward secrecy, known-key passive attack, known-key impersonation attack and so on. Then, we suggest the standard for selecting key agreement protocols for each application, and find the most suitable key agreement protocol for each application.
引用
收藏
页码:191 / 200
页数:10
相关论文
共 50 条
  • [1] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
    Barbosa, Manuel
    Farshim, Pooya
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
  • [2] Key agreement protocols and their security analysis (Extended abstract)
    Blake-Wilson, S
    Johnson, D
    Menezes, A
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
  • [3] Analysis on Security Proof of Two Key Agreement Protocols
    Zhou, Huihua
    Zheng, Minghui
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
  • [4] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [5] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [6] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [7] Modular security proofs for key agreement protocols
    Kudla, C
    Paterson, KG
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 549 - 565
  • [8] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [9] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    [J]. ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [10] Security properties of two authenticated conference key agreement protocols
    Tang, Q
    Mitchell, CJ
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 304 - 314