Multi-Channel Key Agreement Using Encrypted Public Key Exchange

We present a new protocol for cryptographic key agreement between devices which have had no previous association, and which does not rely upon mutual access to a pre-existing key infrastructure. This protocol is suitable for use in mobile ad-hoc computing environments, where the only channels with high data origin authenticity have severely limited bandwidth. The protocol illustrates one use of an heretical design principle: allowing the "same" protocol to provide different security services in different contexts.

[1]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[2]  Bruce Christianson,et al.  "Fair" Authentication in Pervasive Computing , 2005, MADNES.

[3]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[4]  Bengt Ahlgren,et al.  Spontaneous networking: an application-oriented approach to ad hoc networking , 2001, IEEE Commun. Mag..

[5]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[7]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[8]  Frank Stajano,et al.  The Resurrecting Duckling , 1999 .

[9]  Ming Xiao,et al.  Bootstrapping multi-party ad-hoc security , 2006, SAC '06.

[10]  Mike Burmester,et al.  Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers , 2006, MADNES.

[11]  Sadie Creese,et al.  Authentication for Pervasive Computing , 2003, SPC.

[12]  Jaap-Henk Hoepman Ephemeral Pairing on Anonymous Networks , 2005, SPC.

[13]  Gene Tsudik,et al.  Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers , 2005, ESAS.

[14]  Bruce Christianson,et al.  Secure Sessions from Weak Secrets , 2003, Security Protocols Workshop.

[15]  William Stallings,et al.  Cryptography and network security , 1998 .

[16]  Markus G. Kuhn,et al.  So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[18]  Bruce Christianson,et al.  Secure sessions from weak secrets. Commentary. Authors' reply , 2005 .