Authenticated Key Agreement Protocols: A Comparative Study  

Authenticated Key Agreement Protocols: A Comparative Study

在线阅读下载全文

作  者:Areej Omar Baalghusun Olfa Fahad Abusalem Zahra Abbas Al Abbas Jayaprakash Kar 

机构地区:[1]Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA [2]Department of Information Systems, Information Security Research Group, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, KSA

出  处:《Journal of Information Security》2015年第1期51-58,共8页信息安全(英文)

摘  要:One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.

关 键 词:Impersonation RESILIENCE PRIME FACTORIZATION ECDLP TRAPDOOR Function 

分 类 号:TN91[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象