2016
DOI: 10.5815/ijcnis.2016.05.02
|View full text |Cite
|
Sign up to set email alerts
|

Design of a Robust, Computation-Efficient and Secure 3P-EKE Protocol using Analogous Message Transmission

Abstract: In this modern era of digital communication even a trivial task needs to be performed over internet which is not secure. Many cryptographic algorithms existed to provide security which facilitates secure communication through internet. As these algorithms need a secret session key, it is required to interchange this key in a secure way. In two-party communication, two clients initially share a low random (entropy) password through a secure channel to establish a secret session key. But this paradigm necessitat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Also, Kulkarni et al(2007) [21] proposed a novel key exchange protocol based on verifier-based password authentication for three parties; where each client instead of storing the direct password itself it computes a oneway hash function on each password and stores the corresponding result in a server's password [24] is more secured against all types of attacks like password guessing, replay, pre-play, man-in-themiddle attack etc. But unfortunately, this protocol does not solve the problem of a server compromise.…”
Section: B Asymmetric Modelmentioning
confidence: 99%
“…Also, Kulkarni et al(2007) [21] proposed a novel key exchange protocol based on verifier-based password authentication for three parties; where each client instead of storing the direct password itself it computes a oneway hash function on each password and stores the corresponding result in a server's password [24] is more secured against all types of attacks like password guessing, replay, pre-play, man-in-themiddle attack etc. But unfortunately, this protocol does not solve the problem of a server compromise.…”
Section: B Asymmetric Modelmentioning
confidence: 99%