[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Improved authentication key exchange protocol without using one-way hash function

Published: 01 April 2004 Publication History

Abstract

Recently, Hwang, Shiau and Lai proposed an efficient authentication key exchange protocol to decrease the computation cost of the Harn-Lin improved protocol. However, the Hawang-Shiau-Lai protocol cannot withstand the modification attack. Therefore, this paper will propose an improved protocol to enhance the security of the Hwang-Shiau-Lai protocol. The improved protocol is able to defeat the modification attack and is as efficient as the Hwang-Shiau-Lai protocol. Moreover, the improved protocol also provides the perfect forward secrecy.

References

[1]
W. Diffie, and M. E. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, IT-22, NO. 6, 1976, pp. 644--654.
[2]
L. Harn, and H. Y. Lin, "An authenticated key agreement protocol without using one-way function", Proceedings of 8th Information Security Conference, Taiwan, May 1998, pp. 155--160.
[3]
L. Harn, and H. Y. Lin, "Authenticated key agreement without using one-way hash function", Electronics Letters, Vol. 37, NO. 10, 2001, pp. 629--630.
[4]
R. J. Hwang, S. H. Shiau and C. H. Lai, "An enhanced authentication key exchange protocol", Advanced Information Networking and Applications, 2003. AINA 2003. 17th International Conference on, 27--29 March 2003, pp. 202--205.
[5]
W. C. Ku and S. D Wang, "Cryptanalysis of modified authenticated key agreement protocol", Electronics Letters, Vol. 36, NO. 21, 2000, pp. 1770--1771.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 38, Issue 2
April 2004
92 pages
ISSN:0163-5980
DOI:10.1145/991130
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2004
Published in SIGOPS Volume 38, Issue 2

Check for updates

Author Tags

  1. authentication
  2. cryptography
  3. key exchange
  4. modification attack
  5. security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Lightweight and authenticated key exchange based on self linear pairingsMaterials Today: Proceedings10.1016/j.matpr.2020.10.917Online publication date: Dec-2020
  • (2018)Efficient identity-based authenticated multiple key exchange protocolComputers and Electrical Engineering10.1016/j.compeleceng.2011.02.00637:2(191-198)Online publication date: 27-Dec-2018
  • (2018)Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairingsComputers and Electrical Engineering10.1016/j.compeleceng.2006.11.00534:1(12-20)Online publication date: 27-Dec-2018
  • (2015)A resilient identity-based authenticated key exchange protocolSecurity and Communication Networks10.1002/sec.11728:13(2279-2290)Online publication date: 10-Sep-2015
  • (2011)Centralised conference key mechanism with elliptic curve cryptography and Lagrange interpolation for sensor networksIET Communications10.1049/iet-com.2010.05255:12(1727-1731)Online publication date: 12-Aug-2011
  • (2010)Authenticated Multiple Keys Exchange Protocol Based on Bilinear PairingsProceedings of the 2010 International Conference on E-Business and E-Government10.1109/ICEE.2010.333(1303-1306)Online publication date: 7-May-2010
  • (2010)Enhancements of authenticated multiple key exchange protocol based on bilinear pairingsComputers and Electrical Engineering10.1016/j.compeleceng.2009.08.00136:1(155-159)Online publication date: 1-Jan-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media