Abstract
In this paper the solution of preventing active adversary attack, namely Man-in-the-Middle (MiM) attack in e-Banking system is presented. The vulnerable part of communications between user and Bank is the poor authentication level at the user’s side. Therefore, it is a challenge to provide users by the modern means of authentication using e.g. smart phones.
The conjunction of Diffie-hellman key agreement protocol and Schnorr identification protocol is presented by transforming Schnorr identification protocol to Sigma protocol.
It is proved that proposed protocol is secure against active adversary attack, namely against MiM attack under the discrete logarithm assumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-middle attack to the HTTPS protocol. IEEE Secur. Priv. Mag. 7, 78–81 (2009)
Boneh, D., Shoup, V.: A graduate course in applied cryptography (2017). https://crypto.stanford.edu/~dabo/cryptobook/
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, Gilles (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_22
Kilciauskas, A., Butkus, G., Sakalauskas, E.: Authenticated key agreement protocol based on provable secure cryptographic functions. Informatica 31(2), 277–298 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Bartkus, D., Kilciauskas, A., Sakalauskas, E. (2020). Sigma Key Agreement Protocol for e-Banking System. In: Lopata, A., ButkienÄ—, R., GudonienÄ—, D., SukackÄ—, V. (eds) Information and Software Technologies. ICIST 2020. Communications in Computer and Information Science, vol 1283. Springer, Cham. https://doi.org/10.1007/978-3-030-59506-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-59506-7_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59505-0
Online ISBN: 978-3-030-59506-7
eBook Packages: Computer ScienceComputer Science (R0)