Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
Relationships among the computational powers of breaking discrete log cryptosystems
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
An improved key establishment scheme for wireless sensor network
Proceedings of the 6th International Conference on Future Internet Technologies
Efficient key distribution protocol for electronic commerce in mobile communications
PARA'04 Proceedings of the 7th international conference on Applied Parallel Computing: state of the Art in Scientific Computing
Hi-index | 0.00 |
The use of cryptographic system to provide the privacy of transmitted message over network is increasing gradually. A key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardize the key agreement protocols is in rapid progress. In this paper, we study properties and operation of standard key agreement protocols and analyze the security of their protocols under several active attacker models such as active impersonation, key-compromised impersonation, (full/half) forward secrecy, known-key passive attack, known-key impersonation attack and so on. Then, we suggest the standard for selecting key agreement protocols for each application, and find the most suitable key agreement protocol for each application.