A Chronological Review of Key Establishment Models and Protocols

Citation

Yap, Ernest YongYi and Chin, Ji Jian and Goh, Alwyn (2021) A Chronological Review of Key Establishment Models and Protocols. Malaysian Journal of Mathematical Sciences, 15(S). pp. 39-61. ISSN 1823-8343

[img] Text
S2021_J325.pdf
Restricted to Repository staff only

Download (1MB)

Abstract

This work is a review on existing authenticated key exchange (AKE) security models and protocols mainly based on Diffie-Hellman Key Exchange (DHKE). We provide a discussion on the various security models of AKEs, such as the Bellare Rogaway (BR) model, Canetti Krawczyk (CK) model and their variants. Then we provide a review covering over ninety protocols in chronological order. The security models' security features and protocol examples that fit in those security models are exhibited.

Item Type: Article
Uncontrolled Keywords: Security models, Bellare-Rogaway, Canetti-Krawczyk, authenticated key exchange, protocols
Subjects: Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
Divisions: Faculty of Computing and Informatics (FCI)
Depositing User: Ms Nurul Iqtiani Ahmad
Date Deposited: 23 Feb 2022 04:02
Last Modified: 23 Feb 2022 04:02
URII: http://shdl.mmu.edu.my/id/eprint/9970

Downloads

Downloads per month over past year

View ItemEdit (login required)