Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Buchmann-Williams Authenticated Key Agreement Protocol With Pre-shared Password

Soufiane Mezroui, Abdelmalek Azizi and M'hammed Ziane
Laboratoire ACSA, D
Research Journal of Applied Sciences, Engineering and Technology  2014  1:131-134
http://dx.doi.org/10.19026/rjaset.8.950  |  © The Author(s) 2014
Received: March ‎29, ‎2014  |  Accepted: April ‎28, ‎2014  |  Published: July 05, 2014

Abstract

Based on Buchmann-Williams key exchange protocol, a Buchmann-Williams Authenticated Key Agreement (BWAKA) protocol with pre-shared password is proposed. Its security relies on the Discrete Logarithm Problem over class groups of number fields. It provides identity authentication, perfect forward secrecy and key validation.

Keywords:

Diffie-Hellman, reduced ideals, simple authenticated key agreement,


References

  1. Aifen, S., L.C.K. Hui, Y. Yixian and K.P. Chow, 2005. Elliptic curves cryptography based authenticated key agreement with pre-shared password. J. Electron., 22: 268-272 (China).
    CrossRef    
  2. Aydos, M., B. Sunar and C.K. Koc, 1998. An elliptic curve cryptography based authentication and key agreement protocol for wireless communication. Proceeding of the 2nd International Workshop on Discrete Algorithm and Methods for Model Computation and Communication. Dallos, Taxas.
  3. Bellovin, S.M. and M. Merritt, 1992, Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceeding of the IEEE Computer Society Conference on Research in Security and Privacy. Oakland, California, pp: 72-84.
    CrossRef    
  4. Buchmann, J. and H.C. Williams, 1988. A key-exchange system based on imaginary quadratic fields. J. Cryptol., 1: 107-118.
    CrossRef    
  5. Diffie, W., P.C.V. Oorschot and M.J. Wiener, 1992. Authentication and authenticated key exchanges. Design Codes Cryptogr., 2: 107-125.
    CrossRef    
  6. Ku, W.C. and S.D. Wang, 2000, Cryptanalysis of modified authenticated key agreement protocol. Electron. Lett., 36 (21): 1770-1771.
    CrossRef    
  7. Seo, D.H. and P. Sweeney, 1999. Simple authenticated key agreement algorithm. Electron. Lett., 35(13): 1073-1074.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved