PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Enhanced of Key Agreement Protocols Resistant to a Denial-of-Service Attack

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The denial-of-service attack, a malicious client executes a key agreement protocol simultaneously many times to exhaust the server's memory or computing resource and to interfere the honest client connecting with the server. It is a serious problem in the key agreement protocol. A key agreement protocol which resists to the storage-exhaustion and the CPU-exhaustion attack was firstly proposed by Hiros-Matsuura. However, their protocol is not efficient enough during the weak key validation. Our proposed protocol modifies the weak key validation and avoids the unnecessary heavy computation to enhance the resistance of the denial-of-service attack. The most important contributions of our protocol are not only efficiently to resist CPU-exhaustion and memory-exhaustion attacks but also prevent bandwidth consumption.
Wydawca
Rocznik
Strony
389--398
Opis fizyczny
Bibliogr. 18 poz., tab.
Twórcy
autor
  • Department of Management Information System, National Chung Hsing University, 250 Kaokuang, Road, 402 Taichung, Taiwan, R.O.C.
autor
  • Department of Information Management, National Taichung Institute of Technology, 129 Sec. 3, San-min Rd, Taichung, Taiwan 404, R.O.C
autor
  • Graduate Institute of Networking and Communication Engineering, Chao Yang University of Technology, 168 Glfeng E. Rd., Wufeng, Taichung County, Taiwan 413, R.O.C.
Bibliografia
  • [1] R. J. Anderson and M. G. Kuhn.: "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in Proceedings of Networks and Distributed System Security Symposium (NDSS'99), pp. 151-165, Mar. 1999.
  • [2] T. Aura and P. Nikander.: "Stateless connections," in Information and Communications Security (ICICS'97), pp. 87-97,1997.
  • [3] M. Bellare and P. Rogaway.: "Random oracles are practical: A paradigm for designing efficient protocols," in Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62-73,1993.
  • [4] J. Daemen and V. Rijmen.: "Rijndael, the advanced encryption standard," Dr. Dobb's Journal, vol. 26, no. 3, pp. 137-139,2001.
  • [5] G. I. Davida and Y. G. Desmedt.: "A formal framework and evaluation method for network denial of service," in Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp. 4-13, 1999.
  • [6] W. Diffie.: "Authenticated key exchange and secure interactive communication," in Proceedings of 8th Worldwide Congress on Computer and Communications Security and Protection, pp. 300-306,1990.
  • [7] W. Diffie and M. E. Hellman.: "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, pp. 644-654, Nov. 1976.
  • [8] C. Dwork and M. Naor.: "Pricing via processing or combatting junk mail," in Advances in Cryptology-CRYPTO '92, pp. 139-147,1992.
  • [9] B. Harris and R. Hunt.: "TCP/IP security threats and attack methods," Computer Communications, vol. 22, pp. 885-897, June 1999.
  • [10] S. Hirose and K. Matsuura.: "Key agreement protocols resistant to a denial-of-service attack," lEICE Transactions on Information & Systems, vol. E84-D, no. 4, 2001.
  • [11] S. Hirose and S. Yoshida.: "An authenticated Diffie-Hellman key agreement protocol secure against active attacks," Lecture Notes in Computer Science, 1431, vol. 1431, pp. 135-148,1998.
  • [12] Min-Shiang Hwang, Chih-Wei Lin, and Cheng-Chi Lee.: "Improved yen-joye's authenticated multiple-key agreement protocol," IEE Electronics Letters, vol. 38, no. 23, pp. 1429-1431,2002.
  • [13] M. Just and S. Vaudenay.: "Authenticated multi-party key agreement," Lecture Notes in Computer Science, 1163, pp. 36-49, 1996.
  • [14] Cheng-Chi Lee, Min-Shiang Hwang, and Li-Hua Li.: "A new key authentication scheme based on discrete logarithms," Applied Mathematics and Computation, vol. 139, no. 2, pp. 343-349,2003.
  • [15] Iuon-Chang Lin, Chin-Chen Chang, and Min-Shiang Hwang.: "Security enhancement for the simple authentication key agreement algorithm," in The Twenty-Fourth Annual International Computer Software and Applications Conference (COMPSAC) '2000, pp. 113-115,2000.
  • [16] Eric Jui-Lin Lu and Min-Shiang Hwang.: "An improvement of a simple authenticated key agreement algorithm," Pakistan Journal of Applied Sciences, vol. 2, no. 1, pp. 64-65, 2002.
  • [17] Eric Jui-Lin Lu, Cheng-Chi Lee, and Min-Shiang Hwang.: "Cryptanalysis of some authenticated key agreement protocols," International Journal of Computational and Numerical Analysis and Applications, vol. 3, no. 2, pp. 151-157,2003.
  • [18] Bruce Schneier: Applied Cryptography, 2nd Edition. New York: John Wiley & Sons, 1996.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS2-0005-0071
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.