Skip to main content

2020 | OriginalPaper | Buchkapitel

A Secure Key Agreement Protocol for Data Communication in Public Network Based on the Diffie-Hellman Key Agreement Protocol

verfasst von : Chukhu Chunka, Subhasish Banerjee, Soumyajit Nag, Rajat Subhra Goswami

Erschienen in: Micro-Electronics and Telecommunication Engineering

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Idea behind the key agreement protocol is to enable the entities to communicate safely over insecure public networks. In this paper, we proposed a secure key agreement protocol using Diffie-Hellman key agreement. In 2005, Lee and Lee [1] proposed a key agreement protocol dependent on Diffie-Hellman and guarantee that their protocol beat the attacks like man-in-the-middle attack. However, we brought up that Lee and Lee are defenseless against man-in-the-middle attack, impersonate attack and replay attack. Further proposed an improved key agreement protocol and demonstrated that the protocol is secure against the attacks. To confirm the security properties, we have done formal verification called ProVerif tools. Finally, to demonstrate the efficient, we compared other related authentication key agreement schemes with the proposed scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lee KJ, Lee BJ (2005) Cryptanalysis of the modified authenticated key agreement scheme. Appl Math Comput 170(1):280–284MathSciNetMATH Lee KJ, Lee BJ (2005) Cryptanalysis of the modified authenticated key agreement scheme. Appl Math Comput 170(1):280–284MathSciNetMATH
3.
Zurück zum Zitat Seo DH, Sweeney P (1999) Simple authenticated key agreement algorithm. Electron Lett 35(13):1073–1074CrossRef Seo DH, Sweeney P (1999) Simple authenticated key agreement algorithm. Electron Lett 35(13):1073–1074CrossRef
4.
5.
Zurück zum Zitat Ku WC, Wang SD (2000) Cryptanalysis of modified authenticated key agreement protocol. Electron Lett 36(21):1770–1771CrossRef Ku WC, Wang SD (2000) Cryptanalysis of modified authenticated key agreement protocol. Electron Lett 36(21):1770–1771CrossRef
6.
Zurück zum Zitat Hsu CL, Wu TS, Wu TC, Mitchell C (2003) Improvement of modified authenticated key agreement protocol. Appl Math Comput 142(2–3):305–308MathSciNetMATH Hsu CL, Wu TS, Wu TC, Mitchell C (2003) Improvement of modified authenticated key agreement protocol. Appl Math Comput 142(2–3):305–308MathSciNetMATH
7.
Zurück zum Zitat Lee NY, Lee MF (2004) Further improvement on the modified authenticated key agreement scheme. Appl Math Comput 157(3):729–733MathSciNetMATH Lee NY, Lee MF (2004) Further improvement on the modified authenticated key agreement scheme. Appl Math Comput 157(3):729–733MathSciNetMATH
8.
Zurück zum Zitat Blake-Wilson S, Menezes A (1999) Authenticated Diffe-Hellman key agreement protocols. In: International workshop on selected areas in cryptography. Springer, Berlin, Heidelberg, pp 339–361 Blake-Wilson S, Menezes A (1999) Authenticated Diffe-Hellman key agreement protocols. In: International workshop on selected areas in cryptography. Springer, Berlin, Heidelberg, pp 339–361
9.
Zurück zum Zitat Steiner M, Tsudik G, Waidner M (1996) Diffie-Hellman key distribution extended to group communication Steiner M, Tsudik G, Waidner M (1996) Diffie-Hellman key distribution extended to group communication
10.
Zurück zum Zitat Harn L, Lin C (2014) Efficient group Diffie-Hellman key agreement protocols. Comput Electr Eng 40(6):1972–1980CrossRef Harn L, Lin C (2014) Efficient group Diffie-Hellman key agreement protocols. Comput Electr Eng 40(6):1972–1980CrossRef
11.
Zurück zum Zitat Brecher T, Bresson E, Manulis M (2009) Fully robust tree-Diffie-Hellman group key exchange. In: International conference on cryptology and network security. Springer, Berlin, Heidelberg, pp 478–497 Brecher T, Bresson E, Manulis M (2009) Fully robust tree-Diffie-Hellman group key exchange. In: International conference on cryptology and network security. Springer, Berlin, Heidelberg, pp 478–497
12.
Zurück zum Zitat Jarecki S, Kim J, Tsudik G (2010) Flexible robust group key agreement. IEEE Trans Parallel Distrib Syst 22(5):879–886CrossRef Jarecki S, Kim J, Tsudik G (2010) Flexible robust group key agreement. IEEE Trans Parallel Distrib Syst 22(5):879–886CrossRef
13.
Zurück zum Zitat Yoon EJ, Jeon IS (2011) An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun Nonlinear Sci Numer Simul 16(6):2383–2389MathSciNetCrossRef Yoon EJ, Jeon IS (2011) An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. Commun Nonlinear Sci Numer Simul 16(6):2383–2389MathSciNetCrossRef
14.
Zurück zum Zitat Blanchet B (2001) An efficient cryptographic protocol verifier based on prolog rules. CSFW 1:82–96 Blanchet B (2001) An efficient cryptographic protocol verifier based on prolog rules. CSFW 1:82–96
15.
Zurück zum Zitat Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: International conference on computer aided verification. Springer, Berlin, Heidelberg, pp 35–49 Abadi M, Blanchet B, Comon-Lundh H (2009) Models and proofs of protocol security: a progress report. In: International conference on computer aided verification. Springer, Berlin, Heidelberg, pp 35–49
Metadaten
Titel
A Secure Key Agreement Protocol for Data Communication in Public Network Based on the Diffie-Hellman Key Agreement Protocol
verfasst von
Chukhu Chunka
Subhasish Banerjee
Soumyajit Nag
Rajat Subhra Goswami
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-2329-8_54

Neuer Inhalt