A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS

Keeping the communication security between two parties and reducing the computations are important issues, especially in a wireless network environment. Based on the most suitable protocol for wireless communication, we propose a novel parallel key exchange protocol to reduce the waiting time in this paper.

[1]  Kazukuni Kobara,et al.  Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[2]  Min-Shiang Hwang,et al.  An Improvement of a Simple Authenticated Key Agreement Algorithm , 2002 .

[3]  Chou Chen Yang,et al.  Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks , 2004, Informatica.

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[6]  Min-Shiang Hwang,et al.  Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack , 2004, Fundam. Informaticae.

[7]  Yehuda Lindell,et al.  Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.

[8]  Siu-Ming Yiu,et al.  An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[9]  Chris J. Mitchell,et al.  Key control in key agreement protocols , 1998 .

[10]  Min-Shiang Hwang,et al.  A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem , 2003, Comput. Stand. Interfaces.

[11]  S.A Vanstone Next generation security for wireless: elliptic curve cryptography , 2003, Comput. Secur..

[12]  Wen-Shenq Juang,et al.  Efficient User Authentication and Key Agreement with User Privacy Protection , 2008, Int. J. Netw. Secur..

[13]  김기천,et al.  [서평]「Computer Networks and Internets」 , 1999 .

[14]  Ding Yong,et al.  Speeding Scalar Multiplication of Elliptic Curve over GF(2mn) , 2010, Int. J. Netw. Secur..

[15]  Tzu-Chun Lin Algorithms on Elliptic Curves over Fields of Characteristic Two with Non-adjacent Forms , 2009, Int. J. Netw. Secur..

[16]  Rafail Ostrovsky,et al.  Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.

[17]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.