DocumentCode
725918
Title
Personalized two party key exchange protocol
Author
Tong Yi ; Minyong Shi ; Wenqian Shang
Author_Institution
Sch. of Comput. Sci., Commun. Univ. of China, Beijing, China
fYear
2015
fDate
June 28 2015-July 1 2015
Firstpage
575
Lastpage
579
Abstract
This paper analyzes two existing protocols, points out that they cannot resist off-line dictionary attack. And considering most of protocols cannot meet the personalized requirements, this paper presents a personalized key exchange protocol, users can choose the number of generated session keys according to their own requirements. And through safety analysis, the protocol can resist various common attacks.
Keywords
cryptographic protocols; private key cryptography; public key cryptography; -line dictionary attack; personalized two party key exchange protocol; safety analysis; Computer science; Dictionaries; Protocols; Resists; Safety; Security; Servers; key exchange protocol; personalized; session key;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer and Information Science (ICIS), 2015 IEEE/ACIS 14th International Conference on
Conference_Location
Las Vegas, NV
Type
conf
DOI
10.1109/ICIS.2015.7166659
Filename
7166659
Link To Document