Browse > Article

Design of Unproved Diffie-Hellman Key Agreement Protocol Based on Distance Bounding for Peer-to-peer Wireless Networks  

Park, Sern-Young (연세대학교 전기전자공학과 부호 및 정보이론 연구실)
Kim, Ju-Young (연세대학교 전기전자공학과 부호 및 정보이론 연구실)
Song, Hong-Yeop (연세대학교 전기전자공학과 부호 및 정보이론 연구실)
Abstract
We propose an improved Diffie-Hellman(DH) key agreement protocol over a radio link in peer-to-peer networks. The proposed protocol ensures a secure establishment of the shared key between two parties through distance bounding(DB). Proposed protocol is much improved in the sense that we now reduce the number of messages exchanged by two, the number of parameters maintained by four, and 2(7682(k/64)-64) of XOR operations, where k is the length of the random sequence used in the protocol. Also, it ensures a secure reusability of DH public parameters. Start after striking space key 2 times.
Keywords
Diffie-Hellman protocol; Key agreement protocol; MITM(man-in-the-middle) attack; Distance bounding; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Cagalj and J.-P. Hubaux, "Key agreement over a radio link," EPFL-IC-ICA, Tech. Rep. IC/2004/16, Jan. 2004
2 박선영, 김주영, 송홍엽, "Design of improved DH (Diffie-Hellman) key agreement protocol based on distance bounding for peer-to-peer wireless networks," 2007 제 17회 통신정보 합동학술대회 (JCCI), 보광 휘닉스파크, 2007년 5월 2-4일
3 J.-F. Raymond and A. Stiglic, "Security Issues in the Diffie-Hellman Key Agreement Protocol," Sep. 2000. (http://citeseer.nj.nec.com/453885.html)
4 M. Cagalj, S. Capkun and J.-P. Hubaux, "Key agreement in peer-to-peer wireless networks," Proceedings of IEEE, Vol. 94, Issue 2, Feb. 2006
5 S. Brands and D. Chaum, "Distance-bounding protocols," in EUROCRYPT. Heidelberg, Germany: Springer-Verlag, 1993, vol. 765, Lecture Notes in Computer Science, pp. 344-359
6 M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, ACM Conference on Computer and Communications Security 1993
7 A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC press, 1997
8 W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Transaction on Information Theory, 1976
9 S. Halevi and S. Micali, "Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing," In N. Koblitz, editor, Advances in Cryptology-CRYPTO 96, pages 201-215, Lecture Notes in Computer Science, Springer-Verlag, 1996