Enhanced of key agreement protocols resistant to a denial-of-service attack

被引:0
作者
Hwang, MS
Lo, JW
Liu, CH
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Taiwan Inst Technol, Dept Informat Management, Taichung, Taiwan
[3] Chao Yang Univ Technol, Grad Inst Networking & Commun Engn, Wufeng 413, Taichung Cty, Taiwan
关键词
cryptography; denial-of-service; Diffie-Hellman; key agreement; security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The denial-of-service attack, a malicious client executes a key agreement protocol simultaneously many times to exhaust the server's memory or computing resource and to interfere the honest client connecting with the server. It is a serious problem in the key agreement protocol. A key agreement protocol which resists to the storage-exhaustion and the CPU-exhaustion attack was firstly proposed by Hiros-Matsuura. However, their protocol is not efficient enough during the weak key validation. Our proposed protocol modifies the weak key validation and avoids the unnecessary heavy computation to enhance the resistance of the denial-of-service attack. The most important contributions of our protocol are not only efficiently to resist CPU-exhaustion and memory-exhaustion attacks but also prevent bandwidth consumption.
引用
收藏
页码:389 / 398
页数:10
相关论文
共 18 条
[1]  
ANDERSON RJ, 1999, P NETW DISTR SYST SE, P151
[2]  
[Anonymous], LNCS
[3]  
Aura T., 1997, ICICS, V1334, P87
[4]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[5]  
Daemen J, 2001, DR DOBBS J, V26, P137
[6]  
DAVIDA GI, 1999, P 12 IEEE COMP SEC F, P4
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
DIFFIE W, 1990, P SECURICOM, P300
[9]  
Dwork C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P139
[10]  
ERIC JL, 2002, PAKISTAN J APPL SCI, V2, P64