By Topic

A session key establishment protocol using trust

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Harari, S. ; Inst. des Sci. de l''Ingenieur de Toulon, Univ. du Sud Toulon, La Valette Du Var, France

With the extension of Internet and electronic commerce, the use of cryptographic protocols is increasing. The need for secret keys is also increasing since in more and more applications a specific secret key characterizes individual sessions between users. There is therefore a need for fast and safe key establishment protocols between users that do not share any secret information. In this paper a new key establishment protocol is presented. Its cryptographic strength is based on the strength of two RSA problems, and not on the discrete log problem. It has the characteristic of having a natural structure for resisting "man in the middle" attacks since it has constant quantities that are characteristic of their owner and not of the session key being established. These quantities will give proof of the identity of the user and can therefore be certified by a trusted third party.

Published in:

Information and Communication Technologies: From Theory to Applications, 2004. Proceedings. 2004 International Conference on

Date of Conference:

19-23 April 2004