[go: up one dir, main page]

Yahyapoor et al., 2014 - Google Patents

Presentation of a two-party key agreement protocol based on chaos

Yahyapoor et al., 2014

View PDF
Document ID
15936872808289035522
Author
Yahyapoor N
Shaerbaf S
Nikooghadam M
Publication year
Publication venue
SIJ Trans. Comput. Sci. Eng. Appl.

External Links

Snippet

One of the most important cryptography protocols is the key agreement protocol in which used to build a shared secret key between two participants through an insecure channel. To increase the security and efficiency of these protocols, many researches have been …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
EP1134929B1 (en) Secure mutual network authentication and key exchange protocol
Zhang et al. Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
US9698985B2 (en) Authentication
Tan An efficient biometrics-based authentication scheme for telecare medicine information systems
US8971540B2 (en) Authentication
Farash et al. Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
US20150124963A1 (en) Authentication
Ibrahem Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof
Giri et al. Efficient biometric and password based mutual authentication for consumer USB mass storage devices
Islam et al. An anonymous and provably secure authentication scheme for mobile user
Amin et al. Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
Tsai et al. A chaotic map‐based anonymous multi‐server authenticated key agreement protocol using smart card
Song et al. Hardening password-based credential databases
Li et al. A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service
Zhu et al. A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem.
Amin et al. An improvement of wang. et. al.'s remote user authentication scheme against smart card security breach
Luo et al. An efficient chaos‐based 2‐party key agreement protocol with provable security
Hsu et al. Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map
Yahyapoor et al. Presentation of a two-party key agreement protocol based on chaos
Roy et al. A biometrics-based robust and secure user authentication protocol for e-healthcare service
Srivastava et al. A review on remote user authentication schemes using smart cards
Sudhakar et al. Secured mutual authentication between two entities
Zhen et al. Key agreement protocol based on extended chaotic maps with anonymous authentication
Lin et al. Authenticated Key Agreement Scheme with Privacy-Protection in the Three-party Setting.
Kumari et al. Security problems of a “more secure remote user authentication scheme”