[go: up one dir, main page]

Kumar, 2009 - Google Patents

Improving pairing mechanism in Bluetooth security

Kumar, 2009

View PDF
Document ID
6186359696202708568
Author
Kumar T
Publication year
Publication venue
Int. J. Recent Trends Eng

External Links

Snippet

Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
JP7353375B2 (en) End-to-end double ratchet encryption with epoch key exchange
CN108599925B (en) Improved AKA identity authentication system and method based on quantum communication network
US7607012B2 (en) Method for securing a communication
US8443194B2 (en) Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
US8447036B2 (en) Multi-party key agreement method using bilinear map and system therefor
CN111277412A (en) Data security sharing system and method based on block chain key distribution
Di Pietro et al. A two-factor mobile authentication scheme for secure financial transactions
Castiglione et al. An efficient and transparent one-time authentication protocol with non-interactive key scheduling and update
Espalmado et al. DARE Algorithm: A new security protocol by integration of different cryptographic techniques
WO2018047132A1 (en) A system and method for authentication and secure communication
CN113014376A (en) Method for safety authentication between user and server
Duits The post-quantum Signal protocol: Secure chat in a quantum world
Kumar Improving pairing mechanism in Bluetooth security
Phan et al. Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
WO2008004174A2 (en) Establishing a secure authenticated channel
Tseng et al. An efficient anonymous key agreement protocol based on chaotic maps
Fan et al. On the security of password-based pairing protocol in bluetooth
ISLAM Reduced Side Channel Timing Attack in Dragonfly Handshake of WPA3 for MODP Group
US20250286707A1 (en) Multimodal Cryptographic System, Computer Executable Instructions and Method
US20090147956A1 (en) Sharing a Secret Element
Yau et al. On the Security of a Non-Interactive Authenticated Key Agreement over Mobile Communication Networks
Kim et al. Providing secure mobile device pairing based on visual confirmation
Pirzada et al. Randomized Key Exchange Protocol Implementation for Internet of Things Application
Román Hajderek et al. Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols