DocumentCode :
3398833
Title :
Improved Needham-Schroeder protocol for secured and efficient key distributions
Author :
Sultana, Shamima ; Jabiullah, Md Ismail ; Rahman, Md Lutfar
Author_Institution :
Dept. of Comput. Sci. & Eng., Dhaka City Coll., Dhaka, Bangladesh
fYear :
2009
fDate :
21-23 Dec. 2009
Firstpage :
564
Lastpage :
569
Abstract :
A key distribution procedure is an essential constituent of secured exchange of information between the participants. In this paper, a fast symmetric key distribution technique with additional security services is presented. The aim of the proposed technique is to improve the conventional Needham and Schroeder five-message protocol in four aspects. First aspect is to introduce an additional authentication level in originator´s identity. Second aspect is to provide the integrity of the originator´s message. Third aspect is to reduce the time needed to distribute session-key between pair of entities. And the fourth aspect is to develop the key freshness security issue. A comparative analysis between conventional and proposed technique is presented to visualize the improvements of the proposed one. C programming language is used to implement the technique and running time is measured by using the time function and it is found that proposed technique is faster than the conventional one. For the purpose of threat analysis, several attacks, such as altering the message information, are applied by force on the proposed technique to check whether it will provide the security services or not. And the result of threat analysis is that the proposed technique provides all the security services. Hence, the proposed technique will bring a new dimension in key distribution paradigm.
Keywords :
C language; cryptographic protocols; message authentication; message passing; programming languages; C programming language; Needham-Schroeder protocol; authentication level; five-message protocol; key distribution paradigm; key distribution procedure; key distribution technique; key freshness security issue; message information; security services; Authentication; Cities and towns; Computer science; Cryptography; Data security; Distributed computing; Information security; Information technology; Protocols; Random number generation; Entity Authentication; Key Confirmation; Key Distribution; Message Integrity and Security; Secret Key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Information Technology, 2009. ICCIT '09. 12th International Conference on
Conference_Location :
Dhaka
Print_ISBN :
978-1-4244-6281-0
Type :
conf
DOI :
10.1109/ICCIT.2009.5407301
Filename :
5407301
Link To Document :
بازگشت