2014
DOI: 10.1016/j.procs.2014.11.061
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) Using Finite State Machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Juliet attaches a unique fingerprint (the MAC) to the ciphertext using Kauth, like a secret handshake. Romeo verifies this with his copy of Kauth, ensuring Juliet possesses the key and is not an impostor (Isa et al, 2014).…”
Section: Results and Discussion Conventional Cryptography And Post-qu...mentioning
confidence: 82%
See 1 more Smart Citation
“…Juliet attaches a unique fingerprint (the MAC) to the ciphertext using Kauth, like a secret handshake. Romeo verifies this with his copy of Kauth, ensuring Juliet possesses the key and is not an impostor (Isa et al, 2014).…”
Section: Results and Discussion Conventional Cryptography And Post-qu...mentioning
confidence: 82%
“…Nevertheless, how do they know they are talking to the real Juliet? That is where another key (Kauth) and a clever trick called "message authentication code" (MAC) come in (Isa et al, 2014). Juliet attaches a unique fingerprint (the MAC) to the ciphertext using Kauth, like a secret handshake.…”
Section: Results and Discussion Conventional Cryptography And Post-qu...mentioning
confidence: 99%
“…Cryptography aims to ensure that the data sent is correct and accessed by the right people. Research on secure network protocols was carried out by applying encryption using the Diffie-Hellman method [44]. Premnath et al, testing the NTRU cryptographic method, found that it has a faster runtime than RSA at the same security level [45].…”
Section: Related Workmentioning
confidence: 99%
“…Cryptography aims to ensure that the data sent is correct and accessed by the right people. Research on secure network protocols was carried out by applying encryption using the Diffie-Hellman method ( Isa et al, 2014 ). Premnath, Jo & Kim (2014) , testing the NTRU cryptographic method, found that it has a faster runtime than RSA at the same security level.…”
Section: Related Workmentioning
confidence: 99%