Hierarchical key establishment protocols based on secure keyed one-way hash functions
Journal
Proceedings - 12th International Conference on Information Networking, ICOIN 1998
Pages
162-167
Date Issued
1998-01
Date
1998-01
Author(s)
Ku, Wei-Chi
DOI
N/A
Abstract
As key establishment protocols (KEP) are usually the initial step for setting up a secure network-based service, they are very important in enabling the required security. Most of the existing KEPs make use of cryptographic algorithms, either secret key or public-key cryptography. However, it is also possible to employ secure keyed one-way hash functions (SKOWHF) in KEP designs. Though several works have been published in this area, they only focus on the small scale networks. In this paper, we first introduce the SKOWHF-based secure trunks and secure channels; then, two rules for KEP construction, KER1 and KER2, are described. Finally, a hierarchical KEP for large scale networks is proposed. © 1998 IEEE.
Other Subjects
Hash functions; Network protocols; Public key cryptography; Cryptographic algorithms; Key establishment protocol; Large-scale network; One way hash functions; Secret key; Secure channels; Secure networks; Network security
Type
conference paper
File(s)![Thumbnail Image]()
Loading...
Name
00648372.pdf
Size
60.02 KB
Format
Adobe PDF
Checksum
(MD5):1d205621e9195e6ffd54a70f7e145536
