Citation
Yap, Ernest YongYi and Chin, Ji Jian and Goh, Alwyn (2021) A Chronological Review of Key Establishment Models and Protocols. Malaysian Journal of Mathematical Sciences, 15(S). pp. 39-61. ISSN 1823-8343
Text
S2021_J325.pdf Restricted to Repository staff only Download (1MB) |
Official URL: https://mjms.upm.edu.my/lihatmakalah.php?kod=2021/...
Abstract
This work is a review on existing authenticated key exchange (AKE) security models and protocols mainly based on Diffie-Hellman Key Exchange (DHKE). We provide a discussion on the various security models of AKEs, such as the Bellare Rogaway (BR) model, Canetti Krawczyk (CK) model and their variants. Then we provide a review covering over ninety protocols in chronological order. The security models' security features and protocol examples that fit in those security models are exhibited.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | Security models, Bellare-Rogaway, Canetti-Krawczyk, authenticated key exchange, protocols |
Subjects: | Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science |
Divisions: | Faculty of Computing and Informatics (FCI) |
Depositing User: | Ms Nurul Iqtiani Ahmad |
Date Deposited: | 23 Feb 2022 04:02 |
Last Modified: | 23 Feb 2022 04:02 |
URII: | http://shdl.mmu.edu.my/id/eprint/9970 |
Downloads
Downloads per month over past year
Edit (login required) |