CFP last date
20 January 2025
Reseach Article

Performance Analysis of Key Establishment Protocols for Secure System

by Tej Bahadur Shahi, Narendra Bahadur Bohara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 1
Year of Publication: 2013
Authors: Tej Bahadur Shahi, Narendra Bahadur Bohara
10.5120/14416-2530

Tej Bahadur Shahi, Narendra Bahadur Bohara . Performance Analysis of Key Establishment Protocols for Secure System. International Journal of Computer Applications. 83, 1 ( December 2013), 48-52. DOI=10.5120/14416-2530

@article{ 10.5120/14416-2530,
author = { Tej Bahadur Shahi, Narendra Bahadur Bohara },
title = { Performance Analysis of Key Establishment Protocols for Secure System },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 1 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 48-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number1/14416-2530/ },
doi = { 10.5120/14416-2530 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:58:18.103077+05:30
%A Tej Bahadur Shahi
%A Narendra Bahadur Bohara
%T Performance Analysis of Key Establishment Protocols for Secure System
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 1
%P 48-52
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Providing security over open and large distributed networks has always been both intriguing and challenging. There is a great chance for malicious individuals to perform disruptive and unethical tasks. Malicious users may attempt to obtain valuable information. So we require "secure channel" over insecure network. The secure communication channel should achieve primary security goals like confidentiality, integrity, authentication and non-repudiation and shared session keys are incorporated for the purpose. Therefore, it is of great interest and most challenging to devise effective mechanisms to establish these shared session keys, called key distribution problem. Much work has been done in recent years on mechanisms for key establishment. Many cryptosystems rely on cryptographically secure keys and therefore have to deal with issues like key management. A number of key establishment protocols have been proposed by different researchers as solutions to the key distribution problem and password based scheme is one of them. A password is shared between the entities in password based schemes. However, because users choose small and frequently used words as passwords, these schemes are suffered from password guessing attacks. Especially these schemes are subject to offline dictionary attacks. This work focus on password based key establishment. Even though there are a lot of password based schemes, the LDH, enhanced LDH, and PP-TAKE seems to be widely accepted mechanisms. In this context, this study includes performance evaluation of the above mentioned protocols.

References
  1. Stallings William Cryptography and Network Security Principles and practices, Fourth Edition, 2009.
  2. Jablon David P. , Strong password-only authenticated key exchange, ACM, 1996.
  3. Zhu F. , Wong D. , Chan A and Ye R. , More efficient password authenticated key exchange based on RSA Springer-Verlag, 2003.
  4. Aloul1 Fadi, Zahidi1 Syed, El-Hajj Wasim, Multifactor Authentication using Mobile Phones , International Journal of Mathematics and Computer Science, 2009.
  5. Bellovin and Merritt, Encrypted Key Exchange: password based protocols secure against dictionary attacks, IEEE, 1992.
  6. Tseng, Y. M. , Weakness in simple authenticated key agreement scheme, Electronics Letters 36 (1) pp. 48–49, 2005.
  7. Wu Shuhua and Zhu Yuefei, Improved Two-Factor Authenticated Key Exchange Protocol, The International Arab Journal of Information Technology, Vol. 8, No. 4, October 2011.
  8. Seo Dong hwi, Sweeney P. , Simple authenticated key agreement algorithm, Electronics Letters, 1999.
  9. Bellovin and Merritt, Encrypted Key Exchange: password based protocols secure against dictionary attacks, IEEE, 1992.
  10. Hsu C. L. , Wu T. S. , Wu T. C. , Mitchell C. , Improvement of modified authenticated key agreement scheme, Applied Mathematics Computation 142, pp. 305–308, 2003.
  11. Kwon J. O. , Hwang J. Y. , Kim C. , Lee D. H. , Cryptanalysis of Lee–Kim–Yoo password based key agreement scheme, Applied Mathematics and Computation 168, pp. 858–865, 2005.
  12. Pilla K. R. Chandrashekhar and Sebastian M. P. , An Authenticated Session Key Establishment Protocol for High Security Applications, Canadian Journal on Network & Information Security, Canada, Vol. 1, No. 2, pp. 5?15, March 2010.
  13. Mori G. and Malik J. , Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA, IEEE Computer Society, 2003.
  14. Thayananthan A. , Stenger B. , Torr P. , and Cipolla R. , Shape context and chamfer matching in cluttered scenes, IEEE Computer Society, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

LDH CAPTCHA PP-TAKE RSA key establishment protocols.