Skip to main content

An Efficient Key Agreement Protocol for Secure Authentication

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

Abstract

The Diffie-Hellman Key Exchange scheme can produce a common session key between the communication parties but its problem is that it makes a man-in-the middle attack possible. To solve the problem, several protocols have been proposed such as the Simple Authenticated Key Agreement (SAKA) Protocol by mainly Seo-Sweeney[6], Tseng[7], and Ku-Wang[8]. In this paper, we present a new protocol that integrates the establishment phase and the verification phase into single phase and enhances overall processing performance. Our approach does not degrade the basic requirements, safeness and efficiency by analytical analysis of the algorithm. The protocol proposed in this paper takes care of both of those phases simultaneously, which improves the processing performance rather than other approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie, W., Hellman, M.: New directions in Cryptography. IEEE Trans. on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  2. Schneier, B.: Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, Inc., Chichester (1995)

    Google Scholar 

  3. Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Design, Codes and Cryptography 2, 107–125 (1992)

    Article  Google Scholar 

  4. Bellovin, S., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proc. of IEEE Conf. on Research in Security and Privacy, May 1992, pp. 72–84 (1992)

    Google Scholar 

  5. Seo, S., Cho, T., Lee, S.-H.: OTP-EKE: A Key Exchange Protocol based on One-Time-Password. Journal of Korea Information Science Society 29(5), 291–298 (2002)

    Google Scholar 

  6. Seo, D.H., Sweeney, P.: Simple authenticated key agreement algorithm. Electronics Letters 35(13) (June 1999)

    Google Scholar 

  7. Tseng, Y.-M.: Weakness in simple authenticated key agreement protocol. Electronics Letters 36(1) (January 2000)

    Google Scholar 

  8. Ku, W.-C., Wang, S.-D.: Cryptanalysis of modified authenticated key agreement protocol. Electronics Letters 36(21) (October 2000)

    Google Scholar 

  9. Lin, I.-C., Chang, C.-C., Hwang, M.-S.: Security Enhancement for the simple authentication key agreement algorithm. In: Proceedings of the 24th Annual International Computer Software and Application Conference, pp. 113–115 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, YS., Huh, EN., Hwang, J., Lee, BW. (2004). An Efficient Key Agreement Protocol for Secure Authentication. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_87

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_87

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics