Security analysis and applications of standard key agreement protocols

被引:0
|
作者
Oh, S [1 ]
Kwak, J [1 ]
Lee, S [1 ]
Won, D [1 ]
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The use of cryptographic system,to provide the privacy of transmitted message over network is increasing,gradually. A key agreement protocol is the most important part W establish a secure cryptographic system and the effort to standardize the :key agreement protocols is in rapid progress. In this paper, we study properties and operation of standard key agreement protocols and analyze the security of their protocols under several active attacker models such as active impersonation, key-compromised impersonation, (full/half) forward secrecy, known-key passive attack, known-key impersonation attack and so on. Then, we suggest the standard for selecting key agreement protocols for each application, and find the most suitable key agreement protocol for each application.
引用
收藏
页码:191 / 200
页数:10
相关论文
共 50 条
  • [21] Analysis of the key agreement scheme of ZigBee standard
    Chen, Li
    Zhang, Bing
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 633 - 635
  • [22] Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
    Chatterjee, Sanjit
    Menezes, Alfred
    Ustaoglu, Berkant
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2010, 2010, 6498 : 49 - +
  • [23] Multiparty key agreement protocols
    Pieprzyk, J
    Li, CH
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2000, 147 (04): : 229 - 236
  • [24] On the security analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) key exchange/agreement protocols
    Choo, Kim-Kwang Raymond
    [J]. INFORMATICA, 2006, 17 (04) : 467 - 480
  • [26] Provably secure anonymous authenticated key agreement protocols with enhanced security models
    Xie, Qi
    Tan, Xiao
    Hu, Bin
    Wang, Guilin
    Wong, Duncan S.
    Chen, Kefei
    Yu, XiuYuan
    [J]. SCIENCE, 2018, 360 (6387) : 27 - 28
  • [27] Analysis and enhancement of two key agreement protocols for wireless networks
    Singhal, Anshul
    Garg, Vaibhav
    Mathuria, Anish
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 275 - +
  • [28] Dynamic security analysis of group key agreement protocol
    Sun, H
    Lin, DD
    [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (02): : 134 - 137
  • [29] Security analysis of joint group key agreement protocol
    Tan, Chik-How
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (09) : 1876 - 1878
  • [30] Security Analysis of the PACE Key-Agreement Protocol
    Bender, Jens
    Fischlin, Marc
    Kuegler, Dennis
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 33 - 48