Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak

被引:20
作者
Braeken, An [1 ]
机构
[1] Vrije Univ Brussel, INDI, B-1040 Brussels, Belgium
关键词
authentication protocol; anonymity; symmetric key based; Keccak; SECURE;
D O I
10.3390/s20082160
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client-server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.
引用
收藏
页数:15
相关论文
共 33 条
[1]   Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps [J].
Abbasinezhad-Mood, Dariush ;
Nikooghadam, Morteza .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (11) :4815-4828
[2]   A multi-attack resilient lightweight IoT authentication scheme [J].
Adeel, Adil ;
Ali, Mazhar ;
Khan, Abdul Nasir ;
Khalid, Tauqeer ;
Rehman, Faisal ;
Jararweh, Yaser ;
Shuja, Junaid .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
[3]  
Aghili S.F., 2018, CRYPTOL EPRINT ARCH, V2018, P891
[4]  
[Anonymous], 2004, IACR CRYPTOL EPRINT
[5]  
Avoine G., 2019, 2019444 CRYPT EPRINT
[6]  
Bertoni G., 2017, SHA 3 COMPETITION, V6, P16
[7]  
Bertoni Guido., SPONGE FUNCTIONS
[8]  
Braeken A., 2015, Int. J. Smart Home, V9, P177
[9]   Efficient and Provably Secure Key Agreement for Modern Smart Metering Communications [J].
Braeken, An ;
Kumar, Pardeep ;
Martin, Andrew .
ENERGIES, 2018, 11 (10)
[10]  
Cai S, 2009, P 2 ACM C WIR NETW S, P51