Title :
Personalized two party key exchange protocol
Author :
Tong Yi ; Minyong Shi ; Wenqian Shang
Author_Institution :
Sch. of Comput. Sci., Commun. Univ. of China, Beijing, China
fDate :
June 28 2015-July 1 2015
Abstract :
This paper analyzes two existing protocols, points out that they cannot resist off-line dictionary attack. And considering most of protocols cannot meet the personalized requirements, this paper presents a personalized key exchange protocol, users can choose the number of generated session keys according to their own requirements. And through safety analysis, the protocol can resist various common attacks.
Keywords :
cryptographic protocols; private key cryptography; public key cryptography; -line dictionary attack; personalized two party key exchange protocol; safety analysis; Computer science; Dictionaries; Protocols; Resists; Safety; Security; Servers; key exchange protocol; personalized; session key;
Conference_Titel :
Computer and Information Science (ICIS), 2015 IEEE/ACIS 14th International Conference on
Conference_Location :
Las Vegas, NV
DOI :
10.1109/ICIS.2015.7166659