Title :
Asymmetric disribution of computations in Internet Key Exchange Protocol
Author :
Karbasioun, Mohammad Mehdi ; Berenjkub, Mehdi ; Taji, Bahareh
Author_Institution :
Islamic Azad Univ. of Khomeini shahr, Khomeini shahr
Abstract :
IPsec security mechanism standard offers Internet key exchange protocol (IKEv2) for establishing and managing its secure sessions. In IKEv2 both two participants perform the same amount of calculations in all cases and this would cause some deficiencies, when it is used in different situations with different properties. For example in most of client-server connections it is more preferable for servers to do fewer operations in comparison with clients. In the other side in some connections, initiators are entities with less power of computing when comparing with responders. Mobile users are examples of such entities. In these connections, the initiators are the entities who need to perform fewer operations. To solve this problem, we propose two protocols with asymmetric schemes for distribution the calculations. In proposed protocols, one of the participants performs fewer computations, depending on the properties of connections. To achieve this asymmetric scheme, Schnorr signature scheme is used by the entity needs to perform fewer computations.
Keywords :
Internet; protocols; security of data; IPsec security mechanism; Internet key exchange protocol; Schnorr signature scheme; asymmetric distribution; client-server connections; Access control; Access protocols; Authentication; Cryptographic protocols; Cryptography; Data security; Distributed computing; Internet; Standardization; Technology management; Authentication; IKEv2; Signature; computations;
Conference_Titel :
Electrical and Computer Engineering, 2008. CCECE 2008. Canadian Conference on
Conference_Location :
Niagara Falls, ON
Print_ISBN :
978-1-4244-1642-4
Electronic_ISBN :
0840-7789
DOI :
10.1109/CCECE.2008.4564795