Abstract

Authenticated key exchange protocols have an important role for building secure communications amongst two or more entities over the networks. Two party authenticated key exchange protocols where each pair of parties must share a secret with each other; a three-party protocol does not cause any key management problem for the parties. In this paper, an extension of two-party key exchange protocol, which is based on Diffie-Hellman key exchange. is proposed. In this protocol each user exchanges secret key with server then each user uses this secret key to exchange session key with each other. The efficiency and the security analysis of this new key exchange protocol are proven in this paper.

Highlights

  • Key establishment prolrcols are mechanisms that allow any tWo or more users to establish shared keys amongst themselves

  • 1) Links between key exchange and mutual authentication a) Key exchanges mus. be authenticated to prevent attacks. b) A session key makes i. possible to extend an initial authentication to the whole communication. .c) "Authentication and key exchange protocols" provide direct authentication and Accepled Seplcmber 29, 2008

  • There are many different ways to analyze key exchange protocols: I) ' Known key security: a protocol run should result in a unique secret session key

Read more

Summary

Introduction

Key establishment prolrcols are mechanisms that allow any tWo or more users to establish shared keys amongst themselves. Secrets are only used for authentication and do not take part in session keys generation. There are many different ways to analyze key exchange protocols: I) ' Known key security: a protocol run should result in a unique secret session key. If this key is compromised, it should have no impact on other session keys. 2) Forward secrecy: The fact that long-term private keys .are compromised, should have no impact on the secrecy of previously established session · keys. Paper organizatioD, this paper is organized as follows: Section 2 represents the previous work of key

Previous work:
The Model Assumptions
The proposed Protocol
Security analysis: Known key security
I: Communication cost
B: Message-transmitted size
2: On-line computation cost
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call