What Is Key Agreement Scheme

In Diagram 1, the Ellips-Diffie-Hellman (ECDH) algorithm is used using a public key restored by an implicit certificate to solve certain problems. The equation (6) shows that the DS is generated by a key agreement based on the ECDH, which can only calculate A and B. It is possible to generate a KDS which, in turn, generates a session key (via the KDF key bypass function) by entering IDA, IDB and rA,rB; These are the random positive identifiers and whole numbers (Nonces) used to create the DS and set up the session. The only entities they can calculate are A and B, and mutual authentication is ensured by the calculation of KDS. Authenticated Key Exchange (EFT) is the exchange of session keys in a key exchange protocol that also authenticates the identities of the parties involved (for example. B, a password, a public key or a digital certificate). If you. B you connect to a password-protected WiFi network, an authenticated key protocol for the agreement is used, in most cases the agreement with the keys authenticated by the password (PAKE). If you connect to a public wi-fi network, an anonymous key agreement is put in place.

Many AKA systems have recently been proposed, which use ECQV to protect against KGC masks and key replacement attacks. In 2015 [17] and 2017 [18], Sciancalepore et al. developed implicit AKA protocols based on certificates for IoT environments. However, the work of [17] has a problem, because information relating to the generation of session keys is available and the MAC (Message Authentication Code) value for session information contains no idea, so an external attacker could generate the session key by capturing the transferred data. With this session key, a masquerade attack was also possible. The work of [18] solved the problem of creating a session key as described above, but there was a problem that could be transmitted and reused. In addition, many AKA schemes are proposed and applied quickly, including [19,20,21,22,23,24]. Abdmeziem et al. [19] offer a key end-to-end management protocol for online health applications. The authors of [19] propose a protocol to ensure secure communication between restricted and unrestricted nodes using third parties.

This entry was posted in Uncategorized. Bookmark the permalink.