Abstract

Protocol Hsu et.al first introduced in 2012 and is the protocol type Group Key Transfer based Linear Shamir's Secret Sharing Scheme (LSSS). The main idea of this protocol is to use m-secret sharing perspective. This protocol assumes that the difficulty of discrete logarithm problem (DLP) (ie given is computationally very difficult/not feasible to count ) and Cryptographyc Diffie Hellman (CDH) (ie given and it is computationally very difficult/not feasible to count ) in . Thus, it needs to analyze the security attributes to this mechanism Protocol Hsu. Good cryptographic protocols should meet the security attributes Known Security Key, Key-Compromise Impersonation Resillience, Unknown Key-Share Resillience, Key Control and Key Confirmation.

Highlights

  • This protocol assumes that the difficulty of discrete logarithm problem

  • analyze the security attributes to this mechanism Protocol Hsu

  • B., Johnson, D., dan Menezes, A., Key agreement protocols and their security analysis, Proceedings of the 6th IMA International Conference on Cryptography and Coding, London, UK, 1997

Read more

Summary

Made Mustika Kerta Astawa dan Rahmi Nurazizah

Protokol Key establishment merupakan salah satu prinsip dasar dalam membangun kriptografi, dimana didefinisikan sebagai proses untuk menyediakan kunci rahasia bersama diantara dua atau lebih pihak yang berkomunikasi, untuk penggunaan kriptografi berikutnya. Protokol key transport dibuat untuk komunikasi dan transmisi kunci secara aman oleh dua pihak entitas atau lebih, namun yang aktif dalam pembentukan kunci hanya salah satu pihak. Protokol key establishment secara tradisional berada diantara protokol yang sulit untuk dibangun dan meyakinkan proses pertukaran kunci dapat dilakukan secara aman. 1.2 Maksud dan Tujuan Melihat kondisi saat ini banyaknya penerapan protokol kriptografi terutama protokol Key Establishment yang digunakan untuk menyediakan kunci rahasia secara aman seperti protokol Hsu, maka dalam penelitian ini penulis bermaksud memberikan pemahaman dan mengidentifikasi atribut keamanan yang yang telah dipenuhi sehingga dapat dikatakan protokol Hsu terhindar dari serangan active attack. Mengidentifikasi atribut keamanan sehingga dapat dikatakan protokol Hsu merupakan protokol kriptografi yang aman

METODE PENELITIAN
Pengumpulan data
HASIL DAN PEMBAHASAN
KESIMPULAN
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.