Seo et al., 1999 - Google Patents
Simple authenticated key agreement algorithmSeo et al., 1999
- Document ID
- 12323427624353553913
- Author
- Seo D
- Sweeney P
- Publication year
- Publication venue
- Electronics Letters
External Links
Snippet
A password-based method is described which modifies the Diffie-Hellman key agreement protocol to provide user authentication. It is simpler than previously published schemes, prevents the man-in-the-middle attack and requires only two packets to agree on the secret …
- 238000000034 method 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Seo et al. | Simple authenticated key agreement algorithm | |
Jablon | Strong password-only authenticated key exchange | |
Steiner et al. | Refinement and extension of encrypted key exchange | |
US6792533B2 (en) | Cryptographic methods for remote authentication | |
US7010692B2 (en) | Cryptographic methods for remote authentication | |
Jablon | Extended password key exchange protocols immune to dictionary attack | |
EP0535863B1 (en) | A cryptographic protocol for secure communications | |
EP1134929B1 (en) | Secure mutual network authentication and key exchange protocol | |
Tseng | Weakness in simple authenticated key agreement protocol | |
Peyravian et al. | Secure remote user access over insecure networks | |
Jain et al. | A Comparison based approach on mutual authentication and key agreement using DNA cryptography | |
Nose | Security weaknesses of authenticated key agreement protocols | |
Lee et al. | Communication-efficient three-party protocols for authentication and key agreement | |
WO2003063410A1 (en) | Cryptosystem | |
Yoon et al. | A new key agreement protocol based on chaotic maps | |
Hsu et al. | Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map | |
Hölbl et al. | Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol | |
Lee et al. | Improvement of Lee and Lee’s authenticated key agreement scheme | |
Hsu et al. | A dynamic identity end-to-end authentication key exchange protocol for IoT environments | |
Udin et al. | Application of Lamport Digital Signature Scheme into the station-to-station protocol | |
Yoon et al. | New efficient simple authenticated key agreement protocol | |
Kishore et al. | A Novel Methodology for Secure Communications and Prevention of Forgery Attacks | |
Lee et al. | Improvement of HWWM-authenticated key agreement protocol | |
Yoon et al. | An improved Popescu’s authenticated key agreement protocol | |
Ryu et al. | A promising key agreement protocol |