Cargando…

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak

Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper...

Descripción completa

Detalles Bibliográficos
Autor principal: Braeken, An
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218714/
https://www.ncbi.nlm.nih.gov/pubmed/32290358
http://dx.doi.org/10.3390/s20082160
_version_ 1783532852254605312
author Braeken, An
author_facet Braeken, An
author_sort Braeken, An
collection PubMed
description Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.
format Online
Article
Text
id pubmed-7218714
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-72187142020-05-22 Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak Braeken, An Sensors (Basel) Article Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution. MDPI 2020-04-11 /pmc/articles/PMC7218714/ /pubmed/32290358 http://dx.doi.org/10.3390/s20082160 Text en © 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Braeken, An
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
title Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
title_full Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
title_fullStr Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
title_full_unstemmed Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
title_short Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
title_sort highly efficient symmetric key based authentication and key agreement protocol using keccak
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218714/
https://www.ncbi.nlm.nih.gov/pubmed/32290358
http://dx.doi.org/10.3390/s20082160
work_keys_str_mv AT braekenan highlyefficientsymmetrickeybasedauthenticationandkeyagreementprotocolusingkeccak