CFP last date
15 April 2024
Reseach Article

Analysis of Key Exchange Protocols using Session Keys

by Pranav J Vyas, Bhushan H Trivedi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 4
Year of Publication: 2012
Authors: Pranav J Vyas, Bhushan H Trivedi

Pranav J Vyas, Bhushan H Trivedi . Analysis of Key Exchange Protocols using Session Keys. International Journal of Applied Information Systems. 1, 4 ( February 2012), 35-40. DOI=10.5120/ijais12-450164

@article{ 10.5120/ijais12-450164,
author = { Pranav J Vyas, Bhushan H Trivedi },
title = { Analysis of Key Exchange Protocols using Session Keys },
journal = { International Journal of Applied Information Systems },
issue_date = { February 2012 },
volume = { 1 },
number = { 4 },
month = { February },
year = { 2012 },
issn = { 2249-0868 },
pages = { 35-40 },
numpages = {9},
url = { },
doi = { 10.5120/ijais12-450164 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2023-07-05T10:41:23.769396+05:30
%A Pranav J Vyas
%A Bhushan H Trivedi
%T Analysis of Key Exchange Protocols using Session Keys
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 1
%N 4
%P 35-40
%D 2012
%I Foundation of Computer Science (FCS), NY, USA

Security of information flowing through insecure network is becoming complicated with advent of internet and its usage. Encrypting information is one way of securing it from unauthorized access. This paper analyze techniques of exchanging key through which encryption is performed. We review the techniques on various parameters and find which technique is best suitable for use in mobile computers with limited processing power and battery capacity while efficiently working on wireless networks.

  1. R.M. Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Communications of the ACM, v. 21, n. 12, Dec 1978, pp. 993-999.
  2. Michael Burrows, Martin Abadi, and Roger Needham. A Logic of Authentication. Technical Report 39, Digital Systems Research Center, February 1989.
  3. D. Otway and O. Rees, "Efficient and Timely Mutual Authentication," Operating Systems Review, v. 21, n. 1, 1987, pp. 8-10.
  4. Gavin Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information Processing Letters, 56(3):131--136, November 1995.
  5. D.E. Denning and G.M. Sacco, "Timestamps in Key Distribution Protocols," Communications of the ACM, v. 24, n. 8, Aug 1981, pp. 533-536.
  6. Ding Yi-Qiang. The formal analysis of cryptographic protocols. Ph.D. Dissertation, Institute of Software, The Chinese Academy of Science. June 1999.
  7. Colin Boyed, Wenbo Mao. On a Limitation of BAN Logic. Adances in Cryptoology-Eurocrypt'93, Lecture Notes in Computer Science 765, Tor Helleseth(Ed.), pp. 240-247, May 1993.
  8. Wenbo Mao. An Augmentation of BAN-Like Logics, The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland 1995
  9. Guilin Wang, Sihan Quing, Two new attacks against Otway Rees Protocol IFIP/SEC2000, Information Security. 16th World Computer Congress 2000, August 21-25, Beijing, China. Beijing: International Academic Publishers, 2000. 137-139
  10. John Clark and Jeremy Jacob. A survey of authentication protocol literature : Version 1.0., November 1997.
  11. Gavin Lowe. A family of attacks upon authentication protocols. Technical Report 1997/5., Department of Mathematics and Computer Science, University of Leicester, 1997.
  12. Lawrence C. Paulson. Relations between secrets: Two formal analyses of the yahalom protocol. Computer Security, 2001. []3] The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method.
  13. Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen, Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks, IEEE transactions on wireless communication vol.5 No. 9.
  14. Markus Jakobsson and David Pointcheval Mutual Authentication for Low-Power Mobile Devices Syverson (Ed.): FC 2001, LNCS 2339, pp. 178–195, 2002.(Springer-Verlag Berlin Heidelberg) 2002
  15. Jesse walker, Jiangtao Li, Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol In IACR eprint archive, 2010
  16. Victor Shoup, On Formal Model for Secure key exchange, IBM Research Report RZ3120, 1999
  17. Ran Canetti, Hugo Krawczyk, Analysi fo Key-Exchange Protocols and their use for building secure channels, Advances in Cryptology- EUROCRYPT'01, Vol2045 LNCS, PP. 453-474. Springer 2001
  18. Ian Goldberg, Douglas Stebila, and Berkant Ustaoglu, Anonymity and one-way authentication in key exchange protocols Technical Report CACR 2010-11, University of Waterloo Centre for Applied Crypto- graphic Research, 2011
  19. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, and Omer Reingold. Just Fast Keying: Key agreement in a hostile et. ACM Transactions on Information and System Security, 7(2):1 May 2004.
  20. Zhaohui Cheng, Liqun Chen, Richard Comley, and Qiang Tang. Identity-based key agreement with unilateral identity privacy using pairings. Proc. Information Security Practice and Experience (IS- PEC) 2006, LNCS, volume 3903, pp. 202,213. Springer, 2006.
  21. Hung-Yu Chien. ID-based key agreement with anonymity for ad hoc networks. In Tei-Wei Huo, Edwin Sha, Minyi Guo, Laurence Yang, and Zili Shao, editors, Proc. Embedded and Ubiquitous Computing (EUC) 2007, LNCS, volume 4808, pp. 333,345. Springer, 2007.
  22. Hugo Krawczyk. SIGMA: The `SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols. Advances in Cryptology CRYPTO 2003, LNCS, volume 2729, pp. 400,425. Springer, 2003.
  23. Ran Canetti and Hugo Krawczyk. Security analysis of IKE's signature based key-exchange protocol. In Moti Yung, editor, Advances in Cryptology Proc. CRYPTO 2002, LNCS,protocol. volume 2442, pp. 27-52. Springer, 2002.
  24. Alfred J. Menezes and Berkant Ustaoglu. Comparing the pre- and post-specified peer models for key agreement. International Journal of Applied Cryptography, 1(3):236-250, 2009.
  25. Ian Goldberg. On the security of the Tor authentication protocol. In George Danezis and Philippe Golle, editors, Privacy Enhancing Technologies (PET) 2006, LNCS, 4258, pp. 316-331. Springer, 2006.
  26. Lasse verlier and Paul Syverson. Improving efficiency and simplicity of tor circuit establishmentand hidden services. In Privacy Enhancing Technologies, LNCS, volume 4776, pp. 134{152. Springer, 2007.
  27. Aniket Kate, Greg M. Zaverucha, and Ian Goldberg. Pairing-based onion routing with improved forward secrecy. ACM Transactions on Information and System Security, 13(4):29, 2010.
  28. Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, and Eiji Okamoto. Anonymous secure communication in wireless mobile ad-hoc networks. In Frank Stajano, Hyoung Joong Kim, Jong-Suk Chae, and Seong-Dong Kim, editors, Proc. International Converence on Ubiquitous Convergence Technology (ICUCT) 2006, LNCS, volume 4412, pp. 140,149. Springer, 2007.
  29. Sherman S. M. Chow and Kim-Kwang Raymond Choo. Strongly-secure identity-based key agreement and anonymous extension. In Juan Garay, Arjen Lenstra, Masahiro Mambo, and Ren e Peralta, editors, Proc. 10th International Conference on Informa- tion Security Conference (ISC) 2007, LNCS, volume 4779, pp. 203,220. Springer, 2007.
  30. Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. In Proc. 13th USENIX Security Symposium. The USENIX Association, 2004.
  31. D.E. Denning, Cryptography and Data Security (Addison-Wesley, 1982).
  32. R.M. Needham and M.D. Schroeder, "Authentication Revisited, "Operating Systems Review, v. 21, n. 1, 1987, p. 7.
  33. Chiu-Hsiung Liao, Hon-Chan Chen, Ching-Te Wang, An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card, Informatica Vol. 33 (2009) 125–132
  34. Arpa network protocol notes URL:
  35. Blake-Wilson, S.; Menezes, A. , Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol, Public Key Cryptography, Lecture Notes in Computer Science, vol. 1560, Springer, pp. 154–170, 1999
  36. W. Diffie, P.C. van Oorschot, and M.J. Wiener, "Authentication and Authenticated Key Exchanges," Designs, Codes and Cryptography, v. 2, 1992, 107-125.
  37. Ross Anderson and Roger Needham. Robustness principles for public key protocols. In Proceedings of Crypto ’95, 1995
Index Terms

Computer Science
Information Sciences


Session Key Key Exchange Protocols Mutual Authentication User Anonymity Forward Security