skip to main content
article

Parallizable simple authenticated key agreement protocol

Published:01 July 2003Publication History
Skip Abstract Section

Abstract

Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA that is simple and cost-effective. And they provided a formal proof of security to show its strength against both passive and active adversaries. Compared with the previous well-known protocols, SAKA has less number of steps and less computation cost. However, considering the total execution time, SAKA is not the most efficient method, since it does not provide parties with parallel computation. In this paper, we present parallelizable simple authenticated key agreement protocol for improving the efficiency of the SAKA while maintaining provable security.

References

  1. W. Diffie and M. E. Hellman, "New directions in cryptography." IEEE Trans. Inform. Theory, IT-22:644--654, November 1976.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. M. Bellovin and M. Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks," IEEE Symposium on Research in Security and Privacy, pp. 72--84, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. H. Seo and P. Seweeney, "Simple authenticated key agreement algorithm," Electronic Lett., 1999, 35, (13), pp. 1073--1074.Google ScholarGoogle ScholarCross RefCross Ref
  4. V. Boyko, P. MacKenzie and S. Patel, "Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman," Advances in Cryptology-EUROCRYPT'2000, pp. 156--171, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Bellare, D. Pointcheval and P. Rogaway, "Authenticated Key Exchange Secure Against Dictionary Attacks," Advances in Cryptology-EUROCRYPT'2000, pp. 139--155, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Kwon and J. Song, "A Study on the Generalized Key Agreement and Password Authentication Protocol," IEICE TRANS. COMMUN., vol. E83-B, no. 9, pp. 2044--2050, SEP 2000.Google ScholarGoogle Scholar
  7. H. T. Yeh and H. M. Sun, "Simple Authenticated Key Agreement Protocol Resistant to Password Guessing Attacks," ACM Operating Systems Review, vol. 36, Issues 4, October 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Parallizable simple authenticated key agreement protocol
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader