Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies

被引:0
|
作者
Akram, Waseem [1 ]
Mahmood, Khalid [2 ]
ul Haq, Hafiz Burhan [3 ]
Asif, Muhammad [3 ]
Chaudhry, Shehzad Ashraf [4 ,5 ]
Shon, Taeshik [6 ]
机构
[1] Natl Yunlin Univ Sci & Technol, Grad Sch Engn Sci & Technol, Yunlin 64002, Taiwan
[2] Natl Yunlin Univ Sci & Technol, Future Technol Res Ctr, Yunlin 64002, Taiwan
[3] Lahore Garrison Univ, Dept Comp Sci, Lahore 54920, Pakistan
[4] Abu Dhabi Univ, Coll Engn, Dept Comp Sci & Informat Technol, Abu Dhabi 69911, U Arab Emirates
[5] Nisantasi Univ, Fac Engn & Architecture, Dept Software Engn, TR-34398 Istanbul, Turkiye
[6] Ajou Univ, Dept Cybersecur, Suwon 16499, South Korea
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 80卷 / 01期
关键词
Cookies; authentication protocol; impersonation attack; ECC; LIGHTWEIGHT AUTHENTICATION SCHEME;
D O I
10.32604/cmc.2024.052405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol (HTTP) requests and maintains the states of clients' information over the Internet. HTTP cookies are exploited to carry client patterns observed by a website. These client patterns facilitate the particular client's future visit to the corresponding website. However, security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser. Several protocols have been introduced that maintain HTTP cookies, but many of those fail to achieve the required security, or require a lot of resource overheads. In this article, we have introduced a lightweight Elliptic Curve Cryptographic (ECC) based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies. Our proposed protocol uses a secret key embedded within a cookie. The proposed protocol is more efficient and lightweight than related protocols because of its reduced computation, storage, and communication costs. Moreover, the analysis presented in this paper confirms that proposed protocol resists various known attacks.
引用
收藏
页码:263 / 280
页数:18
相关论文
共 50 条
  • [1] Provable Efficient Certificateless Group Key Exchange Protocol
    MOON Sangjae
    Wuhan University Journal of Natural Sciences, 2007, (01) : 41 - 45
  • [2] Secure and efficient protection for HTTP cookies with self-verification
    Lee, Wei-Bin
    Chen, Hsing-Bai
    Chang, Shun-Shyan
    Chen, Tzung-Her
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (02)
  • [3] ESIKE: An Efficient and Secure Internet Key Exchange Protocol
    Marwa Ahmim
    Ahmed Ahmim
    Mohamed Amine Ferrag
    Nacira Ghoualmi-Zine
    Leandros Maglaras
    Wireless Personal Communications, 2023, 128 : 1309 - 1324
  • [4] ESIKE: An Efficient and Secure Internet Key Exchange Protocol
    Ahmim, Marwa
    Ahmim, Ahmed
    Ferrag, Mohamed Amine
    Ghoualmi-Zine, Nacira
    Maglaras, Leandros
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (02) : 1309 - 1324
  • [5] Arcanum: A secure and efficient key exchange protocol for the Internet
    Mian, AS
    Masood, A
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 17 - 21
  • [6] A provable secure authentication protocol given forward secure session key
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    PROGRESS IN WWW RESEARCH AND DEVELOPMENT, PROCEEDINGS, 2008, 4976 : 309 - 318
  • [7] A New Efficient and Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Han, Guangguo
    Ma, Chuangui
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 499 - 502
  • [8] An efficient key exchange protocol for cryptographically secure CDMA systems
    Shepherd, SJ
    Barton, SK
    Kemp, AH
    PIMRC '97 - EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS: WAVES OF THE YEAR 2000+, TECHNICAL PROGRAM, PROCEEDINGS, VOLS 1-3, 1997, : 480 - 484
  • [9] Scalable group key exchange protocol with provable security
    Li, Chengbang
    Xu, Chunxiang
    COMPEL-THE INTERNATIONAL JOURNAL FOR COMPUTATION AND MATHEMATICS IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 32 (02) : 612 - 619
  • [10] A Certificateless Noninteractive Key Exchange Protocol with Provable Security
    Cao, Xuefei
    Dang, Lanjun
    Luan, Yingzi
    You, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020