Title :
Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks
Author :
Bruce, Ndibanje ; Hoon Jae Lee
Author_Institution :
Grad. Sch., Dept. of Ubiquitous IT, Dongseo Univ., Busan, South Korea
Abstract :
Protecting communication among sender and receiver over a public channel network requires for the most part an important security mechanism to provide two parties with the property that they can authenticate each other´s identification parameters which are indispensable to construct a common private key. Based on the decisional Diffie-Hellman assumptions, this paper presents a cryptographic calculation of the shared secret key enabling mutual authentication and confidentiality services over public, insecure networks. This protocol is efficient than “classical” Diffe-Hellman key exchange which provides no authentication at all. To attain this, we first model the scheme with mathematical concept for exponential calculation using entity parameters and finally we simulate the work by CrypTool 2.0 to verify the feasibility and shared secret value sameness. The resultant shows that the protocol is practical and provably-secure in regards with standard cryptographic assumptions. Moreover, the value that would be exchanged can be used as secret key for further encrypted symmetric communication. The proposed method is awfully straightforward, valuable, and resilient to know attacks.
Keywords :
cryptographic protocols; private key cryptography; radio networks; telecommunication security; wireless channels; CrypTool 2.0; confidentiality services; cryptographic computation; decisional Diffie-Hellman assumptions; encrypted symmetric communication; private shared key based mutual authentication protocol; public channel network; security mechanism; shared secret key; shared secret value sameness; wireless networks; Authentication; Computational modeling; Cryptography; Mathematical model; Protocols; Receivers; Authentication; CrypTool; Cryptographic Computation; Diffie-Hellman; Insecure Network; Key Exchange;
Conference_Titel :
Information Networking (ICOIN), 2014 International Conference on
Conference_Location :
Phuket
DOI :
10.1109/ICOIN.2014.6799747