Kumar, 2009 - Google Patents
Improving pairing mechanism in Bluetooth securityKumar, 2009
View PDF- Document ID
- 6186359696202708568
- Author
- Kumar T
- Publication year
- Publication venue
- Int. J. Recent Trends Eng
External Links
Snippet
Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One …
- 238000000034 method 0 description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7353375B2 (en) | End-to-end double ratchet encryption with epoch key exchange | |
CN108599925B (en) | Improved AKA identity authentication system and method based on quantum communication network | |
US7607012B2 (en) | Method for securing a communication | |
US8443194B2 (en) | Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system | |
CN101917270B (en) | Weak authentication and key agreement method based on symmetrical password | |
US8447036B2 (en) | Multi-party key agreement method using bilinear map and system therefor | |
CN111277412A (en) | Data security sharing system and method based on block chain key distribution | |
Di Pietro et al. | A two-factor mobile authentication scheme for secure financial transactions | |
Castiglione et al. | An efficient and transparent one-time authentication protocol with non-interactive key scheduling and update | |
Espalmado et al. | DARE Algorithm: A new security protocol by integration of different cryptographic techniques | |
WO2018047132A1 (en) | A system and method for authentication and secure communication | |
CN113014376A (en) | Method for safety authentication between user and server | |
Duits | The post-quantum Signal protocol: Secure chat in a quantum world | |
Kumar | Improving pairing mechanism in Bluetooth security | |
Phan et al. | Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords | |
WO2008004174A2 (en) | Establishing a secure authenticated channel | |
Tseng et al. | An efficient anonymous key agreement protocol based on chaotic maps | |
Fan et al. | On the security of password-based pairing protocol in bluetooth | |
ISLAM | Reduced Side Channel Timing Attack in Dragonfly Handshake of WPA3 for MODP Group | |
US20250286707A1 (en) | Multimodal Cryptographic System, Computer Executable Instructions and Method | |
US20090147956A1 (en) | Sharing a Secret Element | |
Yau et al. | On the Security of a Non-Interactive Authenticated Key Agreement over Mobile Communication Networks | |
Kim et al. | Providing secure mobile device pairing based on visual confirmation | |
Pirzada et al. | Randomized Key Exchange Protocol Implementation for Internet of Things Application | |
Román Hajderek et al. | Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols |