Title :
Hierarchical key establishment protocols based on secure keyed one-way hash functions
Author :
Ku, Wei-Chi ; De Wang, Sheng
Author_Institution :
Dept. of Electr. Eng., Nat. Taiwan Univ., Taipei, Taiwan
Abstract :
As key establishment protocols (KEP) are usually the initial step for setting up a secure network-based service, they are very important in enabling the required security. Most of the existing KEPs make use of cryptographic algorithms, either secret key or public-key cryptography. However, it is also possible to employ secure keyed one-way hash functions (SKOWHF) in KEP designs. Though several works have been published in this area, they only focus on the small scale networks. In this paper, we first introduce the SKOWHF-based secure trunks and secure channels; then, two rules for KEP construction, KER1 and KER2, are described. Finally, a hierarchical KEP for large scale networks is proposed
Keywords :
cryptography; protocols; KER1; KER2; KERI; cryptographic algorithms; cryptography; hierarchical key establishment protocols; large scale networks; secure channels; secure keyed one-way hash functions; secure network-based service; Authentication; Protocols; Radio access networks;
Conference_Titel :
Information Networking, 1998. (ICOIN-12) Proceedings., Twelfth International Conference on
Conference_Location :
Tokyo
Print_ISBN :
0-8186-7225-0
DOI :
10.1109/ICOIN.1998.648372