DocumentCode :
705554
Title :
An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel
Author :
Bruce, Ndibanje ; HyunHo Kim ; Suhyun Park ; HoonJae Lee
Author_Institution :
Dept. of Ubiquitous IT, Dongseo Univ., Busan, South Korea
fYear :
2015
fDate :
24-27 March 2015
Firstpage :
143
Lastpage :
147
Abstract :
Data exchange over public network requires for the most part an important security mechanism enabling to both sender and receiver the property that they can mutual authenticate using different identification parameters playing the vital role of secret shared key computation. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret key enabling mutual authentication and confidentiality services over public, insecure networks. This protocol is efficient than "classical" Diffe-Hellman key exchange which provides no authentication at all and suffer from man-in-the-middle attack. To attain this, we first model the scheme with mathematical concept for exponential calculation using entity parameters and finally we simulate the work by Scyther tool to verify the provability of the sameness \´shared secret value. With the standards cryptographic assumptions, the simulation result reveals that the protocol is practical and provably-secure. Thus, the proposed cryptographic protocol is awfully, straightforward, valuable, and resilient to know attacks.
Keywords :
cryptographic protocols; private key cryptography; telecommunication security; Diffe-Hellman key exchange; Scyther tool; confidentiality services; cryptographic assumptions; cryptographic calculation; cryptographic protocol; data exchange; decisional Diffie-Hellman assumptions; entity parameters; identification parameters; insecure channel; man-in-the-middle attack; mutual authentication; provable secret shared key computation; public network; security mechanism; Authentication; Computational modeling; Cryptographic protocols; Cryptography; Receivers; Authentication; Cryptographic Protocol; Insecure Channel; Scyther; Secret Key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on
Conference_Location :
Gwangiu
ISSN :
1550-445X
Print_ISBN :
978-1-4799-7904-2
Type :
conf
DOI :
10.1109/AINA.2015.178
Filename :
7097963
Link To Document :
بازگشت