A more secure and efficient Andrew Secure RPC protocol

作者: Sirapat Boonkrong

DOI: 10.1002/SEC.918

关键词:

摘要: The Andrew Secure Remote Procedure Call RPC is a protocol that allows two parties to establish new cryptographic key. was originally designed work on the network of Carnegie Mellon University, USA. Its concept and method can now be used enhance security communications different modules in smart cards, computer networks Internet. There have been many varieties since it designed. We questioned whether or not those existing were really secure efficient. It shown this paper most them are indeed secure, their efficiency improved. carried out analyses experiments illustrate our proposed here more 25% efficient, terms speed, than others. Copyright © 2013 John Wiley & Sons, Ltd.

参考文章(22)
Sirapat Boonkrong, Some Remarks on Andrew Secure RPC. IICS. pp. 350- 358 ,(2010)
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, Moti Yung, Systematic Design of Two-Party Authentication Protocols international cryptology conference. pp. 44- 61 ,(1991) , 10.1007/3-540-46766-1_3
Hugo Krawczyk, The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) international cryptology conference. ,vol. 2001, pp. 310- 331 ,(2001) , 10.1007/3-540-44647-8_19
Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang, C. L. Philip Chen, SCADA communication and security issues Security and Communication Networks. ,vol. 7, pp. 175- 194 ,(2014) , 10.1002/SEC.698
Antonio Maña, Antonio Muñoz, Trusted code execution in JavaCard trust and privacy in digital business. pp. 269- 279 ,(2007) , 10.1007/978-3-540-74409-2_29
Colin Boyd, Anish Mathuria, Douglas Stebila, Protocols for Authentication and Key Establishment ,(2003)
Masoom Alam, Tamleek Ali, Sanaullah Khan, Shahbaz Khan, Muhammad Ali, Mohammad Nauman, Amir Hayat, Muhammad Khurram Khan, Khaled Alghathbar, None, Analysis of existing remote attestation techniques Security and Communication Networks. ,vol. 5, pp. 1062- 1082 ,(2012) , 10.1002/SEC.393
Christophe Huygens, Nelson Matthys, Wouter Joosen, Optimizing resource and data security in shared sensor networks Security and Communication Networks. ,vol. 9, pp. 149- 165 ,(2016) , 10.1002/SEC.342
Mihir Bellare, Ran Canetti, Hugo Krawczyk, A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) symposium on the theory of computing. pp. 419- 428 ,(1998) , 10.1145/276698.276854