Skip to main content

Self-parameter Based Bilateral Session Key Exchange Method

  • Conference paper
  • First Online:
Advances on Broadband and Wireless Computing, Communication and Applications (BWCCA 2018)

Abstract

Bilateral session key exchange as an symmetric encryption scheme is often utilized in temporary data communication. Users can encrypt data with exchanged session keys and then transmit the resulting ciphertext to each other. However, some previous bilateral session key exchange protocols generate only one key in each key exchange procedure, meaning it is not efficient in key generation. On the other hand, the security of key exchange procedure also needs to be improved due to user’s password management problem. Therefore, in this paper, we propose a secure session key exchange scheme, named the Self-Parameter based Bilateral Session Key Exchange Method (BSKE for short), which provides users with a secure method to exchange their encryption keys by utilizing the devices’ parameters and elliptic curve cryptographic method. The BSKE generates 16 keys each time when its key exchange procedure is performed. According to our analyses, the BSKE can also prevent data leakage and resist known-key, replay and eavesdropping attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kshetri, N.: 5G in E-Commerce Activities. IT Prof. 20(4), 73–77 (2018)

    Article  Google Scholar 

  2. Mei, H., Wang, K., Yang, K.: Multi-layer cloud-RAN with cooperative resource allocations for low-latency computing and communication services. IEEE Access 5, 19023–19032 (2017)

    Article  Google Scholar 

  3. Chen, W., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.-H.: NFC mobile transactions and authentication based on GSM network. In: Proceedings of International Workshop on Near Field Communication, pp. 83–89, April 2010

    Google Scholar 

  4. Alasaad, A., Shafiee, K., Behairy, H.M., Leung, V.C.M.: Innovative schemes for resource allocation in the cloud for media streaming applications. IEEE Trans. Parallel Distrib. Syst. 26(4), 1021–1033 (2015)

    Article  Google Scholar 

  5. Moriano, P., Pendleton, J., Rich, S., Camp, L.J.: Stopping the insider at the gates: protecting organizational assets through graph mining. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(1), 4–29 (2018)

    Google Scholar 

  6. Zheng, D., Wu, A., Zhang, Y., Zhao, Q.: Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6, 28019–28027 (2018)

    Article  Google Scholar 

  7. Tsai, K.L., Leu, F.Y., Tsai, S.H.: Data encryption method using environmental secret key with server assistance. Intell. Autom. Soft Comput. 22(3), 423–430 (2016)

    Article  Google Scholar 

  8. Adleman, L.M., Rivest, R.L., Shamir, A.: Cryptographic Communications System and Method, United State Patent No. 4405829, September 1983

    Google Scholar 

  9. ElGamal, T.: A Public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  10. Huang, Y.L., Leu, F.Y.: Constructing a secure point-to-point wireless environment by integrating diffie-hellman PKDS RSA and stream ciphering for user known to each other. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2(3), 96–107 (2011)

    Google Scholar 

  11. Huang, Y.L., Leu, F.Y., You, I., Sun, Y.K., Chu, C.C.: A secure wireless communication system integrating RSA, diffie-hellman PKDS, intelligent protection-key chains and a data connection core in a 4G environment. J. Supercomput. 67(3), 635–652 (2014)

    Article  Google Scholar 

  12. Announcing ADVANCED ENCRYPTION STANDARD (AES): Federal Information Processing Standards Publication, United States National Institute of Standards and Technology (NIST), November 2001

    Google Scholar 

  13. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  14. Li, W.M., Wen, Q.Y., Su, Q., Zhang, H., Jin, Z.P.: Password-authenticated multiple key exchange protocol for mobile applications. China Commun. 9(1), 64–72 (2012)

    Google Scholar 

  15. Pandit, T., Barua, R., Tripathy, S.: eCK secure single round ID-based authenticated key exchange protocols with master perfect forward secrecy. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 5(4), 65–85 (2014)

    Google Scholar 

  16. Tsai, K.L., Huang, Y.L., Leu, F.Y., Ilsun, I.: TTP based high-efficient multi-key exchange protocol. IEEE Access 4, 6261–6271 (2016)

    Article  Google Scholar 

  17. Rewagad, P., Pawar, Y.: Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. In: Proceedings of International Conference on Communication Systems and Network Technologies, pp. 437–439, April 2013

    Google Scholar 

  18. Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farràs, O., Manjón, J.A.: Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Trans. Comput. 65(2), 466–479 (2016)

    Article  MathSciNet  Google Scholar 

  19. Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the Symposium on Security and Privacy, pp. 72–84, May 1992

    Google Scholar 

  20. Abdalla, M., Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Topics in Cryptology-CT-RSA 2005. LNCS, pp. 191–208. Springer (2005)

    Google Scholar 

  21. Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques Bruges, pp. 139–155, May 2000

    Chapter  Google Scholar 

  22. Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Proceedings of the International Workshop on Theory and Practice in Public Key Cryptography, pp. 65 − 84, January 2005

    Google Scholar 

  23. Chen, C.M., Xu, L., Fang, W., Wu, T.Y.: A three-party password authenticated key exchange protocol resistant to stolen smart card attacks. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp. 331–336, November 2016

    Google Scholar 

  24. Xie, Q., Wong, D.S., Wang, G., Tan, X., Chen, K., Fang, L.: Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model. IEEE Trans. Inf. Forensics Secur. 12(6), 1382–1392 (2017)

    Article  Google Scholar 

  25. Smart, N.P.: The discrete logarithm problem on elliptic curves of trace one. J. Cryptol. 12(3), 193–196 (1999)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun-Lin Tsai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tsai, KL., Leu, FY., Chang, SW. (2019). Self-parameter Based Bilateral Session Key Exchange Method. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02613-4_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02612-7

  • Online ISBN: 978-3-030-02613-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics