• Tidak ada hasil yang ditemukan

Abstract - IDR - IIT Kharagpur

N/A
N/A
Protected

Academic year: 2024

Membagikan "Abstract - IDR - IIT Kharagpur"

Copied!
1
0
0

Teks penuh

(1)

Copyright

IIT Kharagpur

Abstract

In the current age of information communication, security is one of the most important concern which is attracting a lot of attention from the research community. Cryptography is a pivotal method to offer security to communication of various information. Authenti- cation and key establishment protocols are cryptographic techniques that are the first steps to set up a secure communication by authenticating the users involved and establishing a secure key among them. The key can subsequently be used to offer various security services. In this thesis various new protocols for authentication and key establishment are proposed in order to enhance efficiency and security of communication.

In the design of key establishment protocols, the use of cryptographic primitives re- quiring less computations are preferred to increase efficiency. Particularly, due to the popularity of applications in heterogeneous environments, protocols having less compu- tational burden on the low power users have become essential. One of the design goals of the protocols proposed in the thesis is to provide an asymmetric computational pattern to enhance the overall efficiency. The security analysis of the protocols have been performed under provable security model.

The contributions of the thesis can be classified into three parts. In the first part, we are concerned with the analysis and design of server based two-party protocols, where a common weakness in the key control of three existing protocols has been discussed. Then a set of protocols having varying key control properties is proposed using one way hash functions. The protocols have better efficiency property compared to the existing ones.

In the second part, we have proposed a novel authenticated and contributory key agree- ment protocol. The protocol provides truly contributory key agreement using a poly- nomial interpolation based key construction. Then we have extended the protocol for communication between a set of resource constrained users connected to one/more pow- erful node. The protocol follows an asymmetric computation pattern and achieves better efficiency and security compared to the existing works. In order to enhance the scalability of the protocol, it has also been extended to hierarchy.

Finally, we have analyzed the security protocols for third generation GSM and CDMA mobile networks and summarized their corresponding threats. We have complemented the threats by proposing new authentication and key agreement protocols for the next generation mobile networks.

Keywords: Cryptography, Authentication, Key establishment protocols, Heterogeneous environment.

1

Referensi

Dokumen terkait

A new spatial interpolation method is proposed, namely semantic kriging SemK, which is capable not only to model the LULC distribution of the terrain, but also incorporate this property

Based on recent trends in World architecture, the research establishes the continued relevance of the Post-Modern in the present era, but identifies that the narrative of Indian Post-

The next topology is a natural sinusoidal hybrid converter proposed for relatively higher value of medium voltage drives, front-end converters, and reactive power compensator

In the existing fast decoupled state estimators, the off-diagonal blocks of the Jacobian/gain matrix are assumed to be zero in order to get a decoupled solution algorithm.. The new

The density, porosity and microhardness decrease and specific wear rate increases with increase in layer thickness and hatching distance.. The decrease in scan speed improves the above

Key Words/Phrases: Wind engineering, Thunderstorm downburst, Dry microburst, LES, Macro-flow dynamics, Physical simulation, Impinging jet model, swirling jet, Stream function-vorticity

Historically, algorithms have been proposed for a wide range of varying task graph and processor models that primarily favor a static analysis of task graphs to schedule on a target

First, a set of design guidelines are proposed for the RC ladder network so that fractors of given α, F, constant phase zone CPZ and phase band can be realized.. Next, using this RC