Authenticated Key Agreement Protocols: A Comparative Study
Authenticated Key Agreement Protocols: A Comparative Study作者机构:Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah KSA Department of Information Systems Information Security Research Group Faculty of Computing and Information Technology King Abdulaziz University Jeddah KSA
出 版 物:《Journal of Information Security》 (信息安全(英文))
年 卷 期:2015年第6卷第1期
页 面:51-58页
学科分类:0810[工学-信息与通信工程] 08[工学] 081001[工学-通信与信息系统]
主 题:Impersonation Resilience Prime Factorization ECDLP Trapdoor Function
摘 要:One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.