Abstract
Bilateral session key exchange as an symmetric encryption scheme is often utilized in temporary data communication. Users can encrypt data with exchanged session keys and then transmit the resulting ciphertext to each other. However, some previous bilateral session key exchange protocols generate only one key in each key exchange procedure, meaning it is not efficient in key generation. On the other hand, the security of key exchange procedure also needs to be improved due to user’s password management problem. Therefore, in this paper, we propose a secure session key exchange scheme, named the Self-Parameter based Bilateral Session Key Exchange Method (BSKE for short), which provides users with a secure method to exchange their encryption keys by utilizing the devices’ parameters and elliptic curve cryptographic method. The BSKE generates 16 keys each time when its key exchange procedure is performed. According to our analyses, the BSKE can also prevent data leakage and resist known-key, replay and eavesdropping attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kshetri, N.: 5G in E-Commerce Activities. IT Prof. 20(4), 73–77 (2018)
Mei, H., Wang, K., Yang, K.: Multi-layer cloud-RAN with cooperative resource allocations for low-latency computing and communication services. IEEE Access 5, 19023–19032 (2017)
Chen, W., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.-H.: NFC mobile transactions and authentication based on GSM network. In: Proceedings of International Workshop on Near Field Communication, pp. 83–89, April 2010
Alasaad, A., Shafiee, K., Behairy, H.M., Leung, V.C.M.: Innovative schemes for resource allocation in the cloud for media streaming applications. IEEE Trans. Parallel Distrib. Syst. 26(4), 1021–1033 (2015)
Moriano, P., Pendleton, J., Rich, S., Camp, L.J.: Stopping the insider at the gates: protecting organizational assets through graph mining. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 9(1), 4–29 (2018)
Zheng, D., Wu, A., Zhang, Y., Zhao, Q.: Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6, 28019–28027 (2018)
Tsai, K.L., Leu, F.Y., Tsai, S.H.: Data encryption method using environmental secret key with server assistance. Intell. Autom. Soft Comput. 22(3), 423–430 (2016)
Adleman, L.M., Rivest, R.L., Shamir, A.: Cryptographic Communications System and Method, United State Patent No. 4405829, September 1983
ElGamal, T.: A Public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
Huang, Y.L., Leu, F.Y.: Constructing a secure point-to-point wireless environment by integrating diffie-hellman PKDS RSA and stream ciphering for user known to each other. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2(3), 96–107 (2011)
Huang, Y.L., Leu, F.Y., You, I., Sun, Y.K., Chu, C.C.: A secure wireless communication system integrating RSA, diffie-hellman PKDS, intelligent protection-key chains and a data connection core in a 4G environment. J. Supercomput. 67(3), 635–652 (2014)
Announcing ADVANCED ENCRYPTION STANDARD (AES): Federal Information Processing Standards Publication, United States National Institute of Standards and Technology (NIST), November 2001
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Li, W.M., Wen, Q.Y., Su, Q., Zhang, H., Jin, Z.P.: Password-authenticated multiple key exchange protocol for mobile applications. China Commun. 9(1), 64–72 (2012)
Pandit, T., Barua, R., Tripathy, S.: eCK secure single round ID-based authenticated key exchange protocols with master perfect forward secrecy. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 5(4), 65–85 (2014)
Tsai, K.L., Huang, Y.L., Leu, F.Y., Ilsun, I.: TTP based high-efficient multi-key exchange protocol. IEEE Access 4, 6261–6271 (2016)
Rewagad, P., Pawar, Y.: Use of digital signature with diffie hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. In: Proceedings of International Conference on Communication Systems and Network Technologies, pp. 437–439, April 2013
Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J., Farràs, O., Manjón, J.A.: Contributory broadcast encryption with efficient encryption and short ciphertexts. IEEE Trans. Comput. 65(2), 466–479 (2016)
Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the Symposium on Security and Privacy, pp. 72–84, May 1992
Abdalla, M., Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Topics in Cryptology-CT-RSA 2005. LNCS, pp. 191–208. Springer (2005)
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques Bruges, pp. 139–155, May 2000
Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Proceedings of the International Workshop on Theory and Practice in Public Key Cryptography, pp. 65 − 84, January 2005
Chen, C.M., Xu, L., Fang, W., Wu, T.Y.: A three-party password authenticated key exchange protocol resistant to stolen smart card attacks. In: Advances in Intelligent Information Hiding and Multimedia Signal Processing, pp. 331–336, November 2016
Xie, Q., Wong, D.S., Wang, G., Tan, X., Chen, K., Fang, L.: Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model. IEEE Trans. Inf. Forensics Secur. 12(6), 1382–1392 (2017)
Smart, N.P.: The discrete logarithm problem on elliptic curves of trace one. J. Cryptol. 12(3), 193–196 (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Tsai, KL., Leu, FY., Chang, SW. (2019). Self-parameter Based Bilateral Session Key Exchange Method. In: Barolli, L., Leu, FY., Enokido, T., Chen, HC. (eds) Advances on Broadband and Wireless Computing, Communication and Applications. BWCCA 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 25. Springer, Cham. https://doi.org/10.1007/978-3-030-02613-4_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-02613-4_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02612-7
Online ISBN: 978-3-030-02613-4
eBook Packages: EngineeringEngineering (R0)