CFP last date
20 January 2025
Reseach Article

Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC

by Hassan M. Elkamchouchi, Eman F. Abu Elkhair, Yasmine Abouelseoud
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 11
Year of Publication: 2013
Authors: Hassan M. Elkamchouchi, Eman F. Abu Elkhair, Yasmine Abouelseoud
10.5120/14493-2778

Hassan M. Elkamchouchi, Eman F. Abu Elkhair, Yasmine Abouelseoud . Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC. International Journal of Computer Applications. 83, 11 ( December 2013), 17-24. DOI=10.5120/14493-2778

@article{ 10.5120/14493-2778,
author = { Hassan M. Elkamchouchi, Eman F. Abu Elkhair, Yasmine Abouelseoud },
title = { Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 11 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 17-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number11/14493-2778/ },
doi = { 10.5120/14493-2778 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:06.191215+05:30
%A Hassan M. Elkamchouchi
%A Eman F. Abu Elkhair
%A Yasmine Abouelseoud
%T Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 11
%P 17-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A key establishment protocol allows entities to establish a common secret key to ensure secure communications over an insecure public network. This paper proposes two new two-party key agreement protocols. Both protocols do not involve bilinear pairings. The first protocol is a certificate-based key agreement protocol that is more efficient than [1] due to its dependence on the elliptic curve discrete logarithm problem and the second is an extension to a certificateless key agreement protocol. Both protocols depend on the use of an authentication message to check that the shared session key is equal for both entities before using it. This authentication message prevents the key off-set attack that is valid for the Haiyan-Sun protocol [2]. The security analysis of the second protocol is discussed. The proposed certificateless key agreement protocol is compared with other protocols in literature [2,3,4] and it requires minimal computational cost. Moreover, this protocol is implemented using the Mathematica (7) program.

References
  1. F. Ahmed and Dalia Elkamchouchi ," A New Efficient Protocol For Authenticated Key Agreement", International Journal of Computer and Communication Engineering, Vol. 2, No. 4, July 2013.
  2. H. Sun, Q. Wen, H. Zang and Z. Jin, " A Strongly Secure Pairing –Free Certificateless Authenticated Key Agreement Protocol For Low –Power Devices", ISSN 1392-124X, ISSN 2335-884X (online) Information Technology and control , 2013,Vol. 42 ,No. 2.
  3. D. He , S. Padhye and J. Chen," An Efficient Certificateless Two-Party Authenticated Key Agreement Protocol", Computers & Mathematics with Applications , Volume 64, Issue 6, September 2012, Pages 1914–1926
  4. D. He, and Y. Chen, " An Efficient Certificateless Authenticated Key Agreement Protocol Without Bilinear Pairings", Mathematical and Computer Modelling, 54 (11-12), 3143-3152, 2011
  5. A. Shamir, "Identity-Based Cryptosystems And Signature Protocols", Proc. CRYPTO1984, LNCS, vol. 196, 1984, pp. 47–53.
  6. S. Al-Riyami, and K. G. Paterson, "Certificateless Public Key Cryptography", Proceedings of ASIACRYPT 2003, LNCS 2894, Springer-Verlag, 2003, pp. 452–473.
  7. Z. Shao," Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys From Pairings", Wuhan University Journal of Natural Sciences, 10(1):267-270, 2005.
  8. S. Wang, Z. Cao, and X. Dong, "Certificateless Authenticated Key Agreement Based On The MTI/C0 Protocol", Journal of Information and Computational Science 3 (2006) 575–581.
  9. Y. Shi, and J. Li, " Two-Party Authenticated Key Agreement In Certificateless Public Key Cryptography", Wuhan University Journal of Natural Sciences 12 (1) (2007) 71–74.
  10. T. Mandt, and C. Tan, " Certificateless Authenticated Two-Party Key Agreement Protocols", in the Proceedings of the ASIAN 2006, LNCS, vol. 4435, Springer-Verlag, 2008, pp. 37–44.
  11. C. Swanson, "Security In Key Agreement: Two-Party Certificateless Schemes", Master Thesis, University of Waterloo, 2008.
  12. G. Lippold, C. Boyd, and J. Nieto, "Strongly Secure Certificateless Key Agreement", In Pairing 2009, pages 206-230.
  13. L. Zhang, F. Zhang, Q. Wua, and J. Domingo-Ferrer, "Simulatable Certificateless Two-Party Authenticated Key Agreement Protocol", Information Sciences 180 (2010) 1020–1030. 16
  14. L. Chen, Z. Cheng, and N. P. Smart, "Identity-Based Key Agreement Protocols From Pairings", Int. J. Inf. Secur. , 6(2007) pp. 213–241.
  15. M. Geng and F. Zhang, "Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol Without Pairing", In International Conference on Computational Intelligence and Security, pages 208-212, 2009.
  16. M. Hou and Q. Xu," A Two-Party Certificateless Authenticated Key Agreement Protocol Without Pairing", In 2nd IEEE International Conference on Computer Science and Information Technology, pages 412-416, 2009.
  17. G. Yang, and C. Tan," Strongly Secure Certificateless Key Exchange Without Pairing", In the 6th ACM Symposium on Information, Computer and Communications Security, 71-79, 2011.
  18. D. He, J. Chen, and J. Hu," A Pairing-Free Certificateless Authenticated Key Agreement Protocol", International Journal of Communication Systems, DOI: 10. 1002/dac. 1265, 2011.
  19. Y. Kim , Y. Kim , Y. Choe and H. Chol O, " An Efficient Bilinear Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocol In The Eck Model", KISU?MATH?2013?E?R?016: Version 4
  20. S. H. Islama and G. P. Biswas, " An Improved Pairing-Free Identity-Based Authenticated Key Agreement Protocol Based On ECC", International Conference on Communication Technology and System Design 2011.
  21. S. Blake-Wilson, D. Johnson, and A. Menezes, " Key Agreement Protocols And Their Security Analysis", Proc. of the 6th IMA International Conference on Cryptography and Coding, LNCS, Springer-Verlag, 1997; 1335:30?45
Index Terms

Computer Science
Information Sciences

Keywords

Key Agreement (KA) protocol Elliptic Curve Discrete Logarithm Problem ID-Based cryptography Key Off-Set Attack Certificateless cryptosystems.