Advertisement

Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack

  • Mounita Saha
  • Dipanwita RoyChowdhury
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4332)

Abstract

In this work, we have identified a class of weakness named as insider-replay attack in a number of existing protocols and propose a common design principle to avoid the weakness. Also, based on the design principles, we propose three key establishment schemes under two different scenarios. The proposed schemes are efficient in terms of number of nonce used and are based on one-way functions.

Keywords

Shared Secret Entity Authentication Computer Security Foundation Workshop Intermediate User Oriented Goal 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gong, L.: Using One-way Functions for Authentication, pp. 8–11 (1989)Google Scholar
  2. 2.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, available at: http://www.cacr.math.uwaterloo.ca/hac/index.html
  3. 3.
    Boyd, C., Mathuria, A.: Systematic Design of key establishment protocols based on one-way functions. IEEE proceedings on computer and digital technology 144(2) (March 1997)Google Scholar
  4. 4.
    Mathuria, A., Jain, V.: On Efficient Key Agreement Protocols (2005)Google Scholar
  5. 5.
    Gong, L.: Lower bounds on Messages and Rounds for Network Authentication Protocols (1993)Google Scholar
  6. 6.
    Boyd, C., Mathuria, A.: Protocols for authentication and key establishment. Springer, Heidelberg (2003)MATHGoogle Scholar
  7. 7.
    Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R.: The CryptoKnight Family of light-weight protocols for authentication and key distribution. IEEE/ACM Transaction on networking 3, 31–41 (1995)CrossRefGoogle Scholar
  8. 8.
    Paulson, L.C.: Relation between secrets: Two formal analyses of the Yahalom’s protocol. Journal of computer security 9, 197–216 (2001)MathSciNetGoogle Scholar
  9. 9.
    Boyd, C.: A class of flexible and efficient key management protocols. In: 9th IEEE Computer Security Foundations Workshop, pp. 2–8. IEEE Press, Los Alamitos (1996)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Mounita Saha
    • 1
  • Dipanwita RoyChowdhury
    • 1
  1. 1.Department of Computer Science and EngineeringIndian institute of TechnologyKharagpurIndia

Personalised recommendations