A new authenticated key agreement protocol

被引:0
|
作者
Abi-Char, Pierre E. [1 ]
Mhamed, Abdallah [1 ]
El-Hassan, Bachar [1 ]
机构
[1] Inst Natl Telecommun, CNRS, UMR 5157, GET, F-91011 Evry, France
关键词
D O I
10.1007/978-1-4020-6270-4_57
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a New Authenticated Key Agreement (NAKA) protocol that provides secure mutual authentication, key establishment and key confirmation over an untrusted network. The main comparative study of our proposed protocol concerns the performance capabilities, including computational and communication load. In addition, the new protocol achieves many of the required security properties. It can resist dictionary attacks mounted by either passive or active networks intruders, allowing even the use of a weak password to be used. It can resist Impersonate attack. It also offers perfect forward secrecy which protects past sessions and passwords against future compromise. Finally, it can resist known-key and resilience to server attack. Our proposed protocol combines techniques of challenge-response protocols with symmetric key agreement protocols and offers significantly improved performance in computational and communication load over comparably many authenticated key agreement protocols such as B-SPEKE, SRP, AMP, PAK-RY, PAK-X, SKA and LR-AKE.
引用
收藏
页码:629 / 629
页数:1
相关论文
共 50 条
  • [1] A new authenticated key agreement protocol
    Kim, KW
    Ryu, EK
    Lee, HM
    Yoo, KY
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, : 91 - 94
  • [2] Authenticated Key Agreement Protocol
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    CHINA COMMUNICATIONS, 2010, 7 (05) : 1 - 8
  • [3] New efficient Simple Authenticated Key Agreement protocol
    Yoon, EJ
    Yoo, KY
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2005, 3595 : 945 - 954
  • [4] A new authenticated key agreement for session initiation protocol
    Xie, Qi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (01) : 47 - 54
  • [5] A secure authenticated key agreement protocol
    Popescu, C
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 783 - 786
  • [6] A Deniable Authenticated Key Agreement Protocol
    TIAN Haibo1
    2. Guangdong Key Laboratory of Information Security Technology
    WuhanUniversityJournalofNaturalSciences, 2008, (06) : 645 - 650
  • [7] AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL
    Wang Changji Yang Bo Wu Jianping Network Research Center Tsinghua University Beijing China
    JournalofElectronics, 2005, (05) : 485 - 489
  • [8] Authenticated commutator key agreement protocol
    Ushakov A.
    Groups, Complexity, Cryptology, 2016, 8 (02) : 127 - 133
  • [9] An efficient protocol for authenticated key agreement
    Law, L
    Menezes, A
    Qu, MH
    Solinas, J
    Vanstone, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) : 119 - 134
  • [10] A robust authenticated key agreement protocol
    Lee, HM
    Ryu, EK
    Kim, KW
    Lee, JM
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 76 - 79