An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
Password authentication with insecure communication
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Protocol Interactions and the Chosen Protocol Attack
Proceedings of the 5th International Workshop on Security Protocols
A Security Analysis of the Cliques Protocols Suites
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
ISM '05 Proceedings of the Seventh IEEE International Symposium on Multimedia
A Survey of Lightweight-Cryptography Implementations
IEEE Design & Test
Attacks on the RC4 stream cipher
Designs, Codes and Cryptography
Computational soundness of observational equivalence
Proceedings of the 15th ACM conference on Computer and communications security
Models and Proofs of Protocol Security: A Progress Report
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
Automatic verification of correspondences for security protocols
Journal of Computer Security
Certificateless authenticated two-party key agreement protocols
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Wireless and Mobile Networks Security
Wireless and Mobile Networks Security
Cryptographic extraction and key derivation: the HKDF scheme
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
On bluetooth repairing: key agreement based on symmetric-key cryptography
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Efficient constructions for one-way hash chains
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
On the security of public key protocols
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Authenticated key agreement protocols provide wireless technologies with fundamental mechanisms such as session key generation and device authentication. Many of these protocols have been designed specifically for those technologies, but most of them do not integrate all the security requirements, and others have been attacked. Another important issue that arises in practice is related to key management, since the deployement and replacement of keying material is costly and may potentially lead to security vulnerabilities. For these reasons, we propose a generic authenticated key agreement protocol in which the long term secret is automatically and periodically renewed. The focus of this work is to formally assess the security offered by the protocol's key renewing in the case of a long term use of the system. The formal analysis is carried using the automated tools ProVerif and AVISPA. The protocol is designed to rely only on symmetric key algorithms and is suitable for devices that have limited hardware capabilities.