Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack
In this work, we have identified a class of weakness named as insider-replay attack in a number of existing protocols and propose a common design principle to avoid the weakness. Also, based on the design principles, we propose three key establishment schemes under two different scenarios. The proposed schemes are efficient in terms of number of nonce used and are based on one-way functions.
KeywordsShared Secret Entity Authentication Computer Security Foundation Workshop Intermediate User Oriented Goal
Unable to display preview. Download preview PDF.
- 1.Gong, L.: Using One-way Functions for Authentication, pp. 8–11 (1989)Google Scholar
- 2.Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, available at: http://www.cacr.math.uwaterloo.ca/hac/index.html
- 3.Boyd, C., Mathuria, A.: Systematic Design of key establishment protocols based on one-way functions. IEEE proceedings on computer and digital technology 144(2) (March 1997)Google Scholar
- 4.Mathuria, A., Jain, V.: On Efficient Key Agreement Protocols (2005)Google Scholar
- 5.Gong, L.: Lower bounds on Messages and Rounds for Network Authentication Protocols (1993)Google Scholar