DocumentCode :
3366197
Title :
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography
Author :
Abi-char, Pierre E. ; Mhamed, Abdallah ; El-Hassan, Bachar
Author_Institution :
GET/Inst. Nat. des Telecommun., Evry
fYear :
2007
fDate :
29-31 Aug. 2007
Firstpage :
89
Lastpage :
94
Abstract :
To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session key. So far, several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a secure authenticated key agreement (EC-SAKA) protocol based on elliptic curve cryptography. Our proposed protocol provides secure mutual authentication, key establishment and key confirmation over an untrusted network. The new protocol achieves many of the required security and performance properties. It can resist dictionary attacks mounted by either passive or active networks intruders. It can resist man-in-the middle attack. It also offers perfect forward secrecy which protects past sessions and passwords against future compromise. In addition, it can resist known-key and resilience to server attack. Our proposed protocol uses the signature techniques of ECDSA and the authentication protocol SKA concept. We show that our protocol meets the above security attributes under the assumption that the elliptic curve discrete logarithm problem is secure. Our proposed protocol offers significantly improved performance in computational and communication load over comparably many authenticated key agreement protocols such as B-SPEKE, SRP, AMP, PAK-RY, PAK-X, SKA, LR-AKE and EC-SRP.
Keywords :
cryptographic protocols; public key cryptography; wireless LAN; authenticated key agreement protocol security; authentication protocol; discrete logarithm problem; elliptic curve cryptography; man-in-the middle attack; mobile devices; passive-active networks; wireless local area network; Authentication; Cryptographic protocols; Dictionaries; Elliptic curve cryptography; Mobile communication; Protection; Resists; Robustness; Wireless LAN; Wireless application protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2007. IAS 2007. Third International Symposium on
Conference_Location :
Manchester
Print_ISBN :
0-7695-2876-7
Electronic_ISBN :
978-0-7695-2876-2
Type :
conf
DOI :
10.1109/IAS.2007.57
Filename :
4299756
Link To Document :
بازگشت