ارسل ملاحظاتك

ارسل ملاحظاتك لنا







An Improved Three Party Authenticated Key Exchange Protocol Using Hash Function And Elliptic Curve Cryptography For Mobile Commerce Environments

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Islam, SK Hafizul (Author)
مؤلفين آخرين: Amin, Ruhul (Co-Author) , Farash, Mohammad Sabzinejad (Co-Author) , Li, Xiong (Co-Author) , Kumari, Saru (Co-Author) , Biswas, G. P. (Co-Author)
المجلد/العدد: مج29, ع3
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2017
الصفحات: 311 - 324
DOI: 10.33948/0584-029-003-008
ISSN: 1319-1578
رقم MD: 974199
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Elliptic Curve Cryptography | Authenticated Key Exchange Protocol | Man In The Middle Attack | Mobile Commerce Environments
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
المستخلص: In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-themiddle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments.

ISSN: 1319-1578