Title of article :
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
Author/Authors :
islam, s.k. hafizul birla institute of technology and science, pilani campus - department of computer science and information systems, India , amin, ruhul indian school of mines - department of computer science and engineering, India , biswas, g.p. indian school of mines - department of computer science and engineering, India , sabzinejad farash, mohammad university of kharazmi - department of mathematical sciences and computer, ايران , li, xiong hunan university of science and technology - school of computer science and engineering, China , kumari, saru ch. charan singh university - department of mathematics, India
Abstract :
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-themiddle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments.
Keywords :
Elliptic curve cryptography , Authenticated key exchange protocol , Man , in , the , middle attack , Mobile , commerce environments
Journal title :
Journal Of King Saud University - Computer and Information Sciences
Journal title :
Journal Of King Saud University - Computer and Information Sciences