Public key versus symmetric key cryptography in client–server authentication protocols

被引:0
作者
An Braeken
机构
[1] Vrije Universiteit Brussel,
来源
International Journal of Information Security | 2022年 / 21卷
关键词
Elliptic curve cryptography; Symmetric key cryptography; Client–server authentication; Protocol design;
D O I
暂无
中图分类号
学科分类号
摘要
Every month, several new protocols are popping up, comparing themselves with a few others and claiming to outperform the whole state of the art. The most popular domain of protocols is the one for authentication in a client–server architecture for which both symmetric key- and public key-based protocols are being proposed. The usage of public key-based mechanisms has several consequences, not only with respect to an increased computational and communication cost, but also with respect to increased possibilities to strengthen the protocol by making it resistant against a semi-trusted third party. On the other hand, we also recall that symmetric key-based protocols can already offer a nice set of security features. We see a trend in the current generation of papers published on public key-based client–server authentication protocols, showing that only a very limited amount of them really exploit the power that public key cryptography can offer with respect to this privacy towards a semi-trusted third party, and most of them do not even satisfy the same security features able to be also realised by a much more efficient symmetric key-based protocol. This paper serves as a warm wake-up call to all protocol designers to rethink the usage of more heavyweight constructions compared to symmetric key-based mechanisms in order to ensure that if they are used, they also fully exploit their inherent strength.
引用
收藏
页码:103 / 114
页数:11
相关论文
共 206 条
  • [1] Tomar A(2019)An ECC based secure authentication and key exchange scheme in multi-server environment Wireless Pers. Commun. 107 351-372
  • [2] Dhar J(2020)Secure two-factor authentication protocol using self-certified public key cryptography for multi-server 5G networks J. Netw. Comput. Appl. 161 102660-208
  • [3] Haq IU(1983)On the security of public key protocols IEEE Trans. Inf. Theory 29 198-715
  • [4] Wang J(1949)Communication theory of secrecy systems Bell Syst. Tech. J. 28 656-654
  • [5] Zhu Y(1976)New directions in cryptography IEEE Trans. Inf. Theory 22 644-209
  • [6] Dolev D(1987)Elliptic curve cryptosystems Math. Comput. 48 203-426
  • [7] Yao AC(1985)Use of elliptic curves in cryptography Crypto Lect. Notes Comput. Sci. 85 417-150261
  • [8] Shannon C(2019)Fog-orchestrated and server-controlled anonymous group authentication and key agreement IEEE Access 7 150247-1509
  • [9] Diffie W(1997)Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM J. Comput. 26 1484-146
  • [10] Hellman ME(2020)An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems Int. J. Inf. Secur. 19 129-249