Dept. of Electr. Eng., National Taiwan Univ.Ku, Wei-ChiWei-ChiKuSHENG-DE WANG2007-04-192018-07-062007-04-192018-07-061998-01http://ntur.lib.ntu.edu.tw//handle/246246/2007041910031829https://www.scopus.com/inward/record.uri?eid=2-s2.0-85050632506&doi=10.1109%2fICOIN.1998.648372&partnerID=40&md5=ff776940a8cef26dcf20078dac248756As key establishment protocols (KEP) are usually the initial step for setting up a secure network-based service, they are very important in enabling the required security. Most of the existing KEPs make use of cryptographic algorithms, either secret key or public-key cryptography. However, it is also possible to employ secure keyed one-way hash functions (SKOWHF) in KEP designs. Though several works have been published in this area, they only focus on the small scale networks. In this paper, we first introduce the SKOWHF-based secure trunks and secure channels; then, two rules for KEP construction, KER1 and KER2, are described. Finally, a hierarchical KEP for large scale networks is proposed. © 1998 IEEE.application/pdf61463 bytesapplication/pdfen-USHash functions; Network protocols; Public key cryptography; Cryptographic algorithms; Key establishment protocol; Large-scale network; One way hash functions; Secret key; Secure channels; Secure networks; Network securityHierarchical key establishment protocols based on secure keyed one-way hash functionsconference paper10.1109/ICOIN.1998.6483722-s2.0-85050632506http://ntur.lib.ntu.edu.tw/bitstream/246246/2007041910031829/1/00648372.pdf