Open Access   Article Go Back

A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation

K.Archana 1 , V.Geetha 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 159-164, Jan-2015

Online published on Jan 31, 2015

Copyright © K.Archana , V.Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.Archana , V.Geetha, “A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.159-164, 2015.

MLA Style Citation: K.Archana , V.Geetha "A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation." International Journal of Computer Sciences and Engineering 3.1 (2015): 159-164.

APA Style Citation: K.Archana , V.Geetha, (2015). A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation. International Journal of Computer Sciences and Engineering, 3(1), 159-164.

BibTex Style Citation:
@article{_2015,
author = {K.Archana , V.Geetha},
title = {A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {159-164},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=382},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=382
TI - A Safe Then Well-Prearranged Two-Waiter Pin Lone Honest Key Conversation
T2 - International Journal of Computer Sciences and Engineering
AU - K.Archana , V.Geetha
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 159-164
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2424 2315 downloads 2546 downloads
  
  
           

Abstract

Password-honest key conversation (PAKE) is an validation maneuver currently a customer then a waiter who portion a pin then validity of the week all extra with thon pin then henceforth together will decide on a cryptographic key. Normally, the pins which are essential to check the patrons are deposited on a lone server. If the waiter is compromised, owing to sure hateful events comparable hacking or installing a Trojan horse, pins which are deposited in the waiter grows revealed. In this newsPA apiece two attendants cooperate to validity of the week a customer then if one waiter is cooperated, the enemy static cannot presentation as a customer with the indication meanwhile the conceded server. Preferred keys aimed at two attendants PAKE are whichever symmetric in the method thon the two waiter consistently underwrite to the validation or unequal in the intellect thon one waiter checks the authenticity of lawful customer with the backing of an extra server. This newsPA apiece gifts the growth of symmetric process aimed at two-waiter PAKE, currently the customer container originate altered cryptographic keys with the two servers. In totaling to thon a Nafter will be produced aimed at the duration of the retro of validation then this will presentation as a timer. If the clock safeguards not expire with in the retro limit, the validation process will be approved out in lateral the boundary which delivers refuge to rerun attacks.

Key-Words / Index Term

PAKE, Vocabulary Attack, Diffie-Hellman Key Exchange, Elgamalencryption, Nafter

References

[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265.
[8] Toorani, M. ; Dept. of Inf., Univ. of Bergen, Bergen, Norway, “Security analysis of J-PAKE”,Published in: Computers and Communication (ISCC), 2014 IEEE Symposium on Date of Conference: 23-26 June 2014 Page(s): 1 – 6.
[9] Ding XiaoFei ; Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China ; Ma ChuanGui, “Cryptoanalysis and Improvements of Cross-Realm C2C-PAKE Protocol”,Published in:
[10] Information Engineering, 2009. ICIE '09. WASE International Conference on (Volume:1 ) Date of Conference: 10-11 July 2009 Page(s): 193 – 196.
[11] Liu Xiu-mei ; Comput. Center, Northeastern Univ., Shenyang ; Zhou Fu-cai ; Chang Gui-Ran,”A New C2C-PAKE Protocol in Cross-Realm Setting”,Published in: MultiMedia and Information Technology, 2008. MMIT '08. International Conference on Date of Conference: 30-31 Dec. 2008 Page(s): 562 – 565.
[12] Gang Yao ; State Key Lab. Of Inf. Security, Grad. Univ. of Chinese Acad. of Sci., Beijing ; Hongji Wang ; Dengguo Feng, “A Group PAKE Protocol Using Different Passwords”,Published in:
[13] Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on (Volume:1 ) Date of Conference: 25-26 April 2009 Page(s): 270 – 273.
[14] Cheung, S. ; Syst. Design Lab., SRI Int., Menlo Park, CA, USA ;Lindqvist, U. ; Fong, M.W.”Modeling multistep cyber attacks for scenario recognition”,Published in: DARPA Information Survivability Conference and Exposition, 2003. Proceedings (Volume:1 ) Date of Conference: 22-24 April 2003 Page(s): 284 - 292 vol.1.
[15] Vorobiev, A. ; Fac. of ICT, Swinburne Univ. of Technol., Melbourne, VIC, Australia ; Han, J. ”Security Attack Ontology for Web Services”,Published in: Semantics, Knowledge and Grid, 2006. SKG '06. Second International Conference on Date of Conference: 1-3 Nov. 2006 Page(s): 42.
[16] Imamoto, K. ; Graduate Sch. of Inf. Sci & Electr. Eng.., Kyushu Univ., Japan ; Sakurai, K.”A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model”,Published in: Advanced Information Networking and Applications, 2004. AINA 2004. 18th International Conference on (Volume:1 ) Date of Conference: 2004 Page(s): 327 - 332 Vol.1.
[17] Phan, R.C.-W. ; Inf. Security Res. Lab., Swinburne Univ. of Technol., Kuching, Malaysia, ”Fixing the integrated Diffie-Hellman-DSA key exchange protocol”,Published in: Communications Letters, IEEE (Volume:9 , Issue: 6 ) Page(s): 570 – 572.
[18] Yang Guang-ming ; Dept. of Inf. Security, Northeastern Univ., Shenyang, China ;Chen Jin-ming ; Lu Ya-feng ; Ma Da-ming,”An efficient improved group key agreement protocol based on Diffie-Hellman key exchange”,Published in: Advanced Computer Control (ICACC), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 27-29 March 2010 Page(s): 303 – 306.
[19] Harn, L. ; Sch. of Comput. & Eng., Univ. of Missouri, Kansas City, MO, USA ; Mehta, M. ; Wen-Jung Hsin,”Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA)”,Published in: Communications Letters, IEEE (Volume:8 , Issue: 3 ) Page(s): 198 – 200.