ارسل ملاحظاتك

ارسل ملاحظاتك لنا







An Improved Three Party Authenticated Key Exchange Protocol Using Hash Function And Elliptic Curve Cryptography For Mobile Commerce Environments

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Islam, SK Hafizul (Author)
مؤلفين آخرين: Amin, Ruhul (Co-Author) , Farash, Mohammad Sabzinejad (Co-Author) , Li, Xiong (Co-Author) , Kumari, Saru (Co-Author) , Biswas, G. P. (Co-Author)
المجلد/العدد: مج29, ع3
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2017
الصفحات: 311 - 324
DOI: 10.33948/0584-029-003-008
ISSN: 1319-1578
رقم MD: 974199
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Elliptic Curve Cryptography | Authenticated Key Exchange Protocol | Man In The Middle Attack | Mobile Commerce Environments
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02724nam a22002897a 4500
001 1717002
024 |3 10.33948/0584-029-003-008 
041 |a eng 
044 |b السعودية 
100 |9 524449  |a Islam, SK Hafizul  |e Author 
245 |a An Improved Three Party Authenticated Key Exchange Protocol Using Hash Function And Elliptic Curve Cryptography For Mobile Commerce Environments 
260 |b جامعة الملك سعود  |c 2017 
300 |a 311 - 324 
336 |a بحوث ومقالات  |b Article 
520 |b  In the literature, many three-party authenticated key exchange (3PAKE) protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-themiddle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments. 
653 |a أمن الملعومات  |a التشفير  |a التجارة الإلكترونية 
692 |b Elliptic Curve Cryptography  |b Authenticated Key Exchange Protocol  |b Man In The Middle Attack  |b Mobile Commerce Environments 
700 |9 525431  |a Amin, Ruhul  |e Co-Author 
700 |9 525432  |a Farash, Mohammad Sabzinejad  |e Co-Author 
700 |9 525433  |a Li, Xiong  |e Co-Author 
700 |9 525434  |a Kumari, Saru  |e Co-Author 
773 |c 008  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 003  |m مج29, ع3  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 029  |x 1319-1578 
700 |9 524981  |a Biswas, G. P.  |e Co-Author 
856 |u 0584-029-003-008.pdf 
930 |d y  |p y 
995 |a science 
999 |c 974199  |d 974199