The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1002/sat.1455
|View full text |Cite
|
Sign up to set email alerts
|

A post quantum secure construction of an authentication protocol for satellite communication

Abstract: Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable.Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure netw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
24
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(24 citation statements)
references
References 29 publications
0
24
0
Order By: Relevance
“…Schemes by Dharminder et al 18 and Kumar and Garg 6 have almost similar computation efficiency as the proposed scheme, according to Table 7.…”
Section: Discussionmentioning
confidence: 61%
See 3 more Smart Citations
“…Schemes by Dharminder et al 18 and Kumar and Garg 6 have almost similar computation efficiency as the proposed scheme, according to Table 7.…”
Section: Discussionmentioning
confidence: 61%
“…However, we have analyzed that scheme by Dharminder et al 18 is susceptible to denial of service attack. As in their scheme, aid i = id i ⨁Hðk u i jjη ui jja u i Þ sent to server and then server retrieve identity (id i ) of user using aid i , which is further used to calculate v u i to authenticate the user.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, the rapid development of quantum computers has rendered it possible to effortlessly crack traditional cryptographic schemes based on number theory, such as Rivest-Shamir-Adleman cryptosystem (RSA) algorithm and elliptic curve cryptosystems (ECC) algorithm. Therefore, Kumar et al [34] and Dharminder et al [35] proposed AKA schemes based on ring learning with error, respectively, which are secure against quantum attacks.…”
Section: B Authentication and Key Agreement (Aka)mentioning
confidence: 99%