Open Access   Article Go Back

An Authenticated Key Agreement Protocol Using Artin’s Braid Group

Atul Chaturvedi1 , Manoj Kumar Misra2 , S.P. Tripathi3 , Varun Shukla4

  1. Dept. of Mathematics, PSIT, Kanpur, India.
  2. Dept. of Computer Science, PSIT, Kanpur, India.
  3. Dept. of Computer Science, IET, Lucknow, India.
  4. Dept. of Electronics and Communication, PSIT, Kanpur, India.

Correspondence should be addressed to: atulibs@gmail.com.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 233-236, Dec-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i12.233236

Online published on Dec 31, 2017

Copyright © Atul Chaturvedi, Manoj Kumar Misra, S.P. Tripathi, Varun Shukla . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Atul Chaturvedi, Manoj Kumar Misra, S.P. Tripathi, Varun Shukla, “An Authenticated Key Agreement Protocol Using Artin’s Braid Group,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.233-236, 2017.

MLA Style Citation: Atul Chaturvedi, Manoj Kumar Misra, S.P. Tripathi, Varun Shukla "An Authenticated Key Agreement Protocol Using Artin’s Braid Group." International Journal of Computer Sciences and Engineering 5.12 (2017): 233-236.

APA Style Citation: Atul Chaturvedi, Manoj Kumar Misra, S.P. Tripathi, Varun Shukla, (2017). An Authenticated Key Agreement Protocol Using Artin’s Braid Group. International Journal of Computer Sciences and Engineering, 5(12), 233-236.

BibTex Style Citation:
@article{Chaturvedi_2017,
author = {Atul Chaturvedi, Manoj Kumar Misra, S.P. Tripathi, Varun Shukla},
title = {An Authenticated Key Agreement Protocol Using Artin’s Braid Group},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {12},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {233-236},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1608},
doi = {https://doi.org/10.26438/ijcse/v5i12.233236}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i12.233236}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1608
TI - An Authenticated Key Agreement Protocol Using Artin’s Braid Group
T2 - International Journal of Computer Sciences and Engineering
AU - Atul Chaturvedi, Manoj Kumar Misra, S.P. Tripathi, Varun Shukla
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 233-236
IS - 12
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
837 426 downloads 261 downloads
  
  
           

Abstract

This paper proposes a new and efficient key agreement protocol where trusted third party (TTP) is involved. There are various available schemes which are based on number theoretic, elliptic curves etc. Due to the availability of modern computers, these schemes are vulnerable to man in the middle attack (MITM). So there is a requirement of new technique for key agreement which surprises the intruders and enhances the security of communication system. Our proposed protocol utilizes the property of a non commutative group. We have given the security proof of our protocol keeping the fact in mind that decomposition and conjugacy search problem are hard in a group which is non commutative.

Key-Words / Index Term

Braid Decomposition Problem(BDP), Conjugacy Search Problem(CSP), Key Agreement, Non Commutative Groups, Trusted Third Party (TTP), Wireless Communication

References

[1] I.Anshel, M.Anshel, B.Fisher, D.Goldfeld, New key agreement protocols in braid group cryptography, Proc.of CT-RSA , LNCS (2020), Springer-Verlag, 2001, 1-15.
[2] I. Anshel, M. Anshel , D. Goldfeld, An algebraic method of public-key cryptography, Math. research letters, 6 ,1999, 287-291.
[3] K.H.Ko, D.H.Choi, M.S.Cho, J.W.Lee, New signature scheme using conjugacy problem, e print archive, http://eprint.iacr.org/2002/168.
[4] K.H. Ko, S.J. Lee, J.H. Cheon, J.W. Han, J.S. Kang, C Park, New public-key cryptosystem using braid groups, Advances in cryptology, proceeding of crypto - 2000, LNCS (1880) , Springer Verlag ,2000, 166-183.
[5] G. Kumar , H. Saini , Novel non commutative cryptography scheme using extra special group, Security and communication networks, 2017.
[6] Y. K. Peker, A new key agreement scheme based on the triple decomposition problem, International journal of network security (6), 2014, 426 – 436.
[7] H.Sibert, P.Dehornoy, M.Girault, Entity authentication schemes using braid word reduction, in International workshop on coding and cryptography (WCC) 2003, Discrete applied mathematics, 154-2, Elsevier, 2006, 420 – 436. (http://eprint.iacr.org/2002/187).
[8] V.Halava, T.Harju, R.Niskanen, I.Potapov, Weighted automata on infinite words in the context of attacker – defender games, Information and computation , Elsevier, 255 (1), 2017, 27 – 44.
[9] E. Artin, Theory of braids, Annals of math.48 (1947),101-126.
[10] W. Diffie, & M.Hellman, New directions in cryptography, IEEE trans. inform. theory, 22 (6),1976,644-654.
[11] J.Birman, Braids, links, and mapping class groups, Annals of math. studies, Princeton Univ. Press ,1975.
[12] F.A. Garside, The braid group and other groups, Quart. J. math. oxford 20-78 ,1969, 235-254.
[13] A.Chaturvedi, M.K.Misra,S.P.Tripathi,V.Shukla,N. Srivastava A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups, Int. J. Advanced Networking and Applications. 9(3) ,2017,3428-3431.
[14] A.Chaturvedi,V.Shukla,N.Srivastava A secure wireless peer to peer authentication protocol using triple decomposition problem, Asian journal of mathematics and computer research.22(2) 2017,63-69.
[15] L.Law, A.Menezes, M.Qu, J.Solinas, S.Vanstone, An efficient protocol for authenticated key agreement, Design, codes and cryptography, 28 (2), 2003, 119-134.
[16] M.Bellare, P.Rogaway, Entity authentication and key distribution, Proceeding of CRYPTO’93, Santa Barbara, USA,1994, 341-358.
[17] A.O. Baalghusun, O.F. Abusalem, Z. A. A. Abbas, J. P. Kar, Authenticated key agreement protocols: A comparative study, Journal of information security, (6), 2015, 51 – 58.
[18] A.Menezes, M.Qu, S.Vanstone, Key agreement and the need for authentication, in proceedings of PKS’95, 1995, 34 – 42.
[19] S. B. Wilson, D.Johnson, A.Menezes, Key agreement protocol and their security analysis, Proceedings of sixth IMA international conference on cryptography and coding, Cirencester, UK, 1997, 30 - 45.
[20] M.V.Bhaskar,G.A.Ramchandra,Y.Deepika,Multipath optimized link state protocol(OLSR) with security for moblle ad-hoc networks .International journal of computer science and engineering,5(11),2017,182-186.