【24h】

Scyther Validated Session Key Establishment in IoT

机译:物联网中经过Scyther验证的会话密钥建立

获取原文

摘要

Key agreement is a bed rock of all security services and primitives. Asymmetric cryptography is a widely adopted method for negotiating a session key over an insecure communication channel. The usage of asymmetric cryptography for key agreement based on elliptical curve cryptography in IoT is of considerable research interest. This owning to the fact that ECC based cryptography is computational less intense than traditional cryptography. The computational effectiveness makes it suitable for resource constraint devices used in IOT and smart city application. In this paper, a de-facto key exchange protocol, Elliptical Curve Diffie-Hellman(ECDH) is evaluated and formally validated .The limitations of ECDH are also pointed out. A session key agreement scheme based on elliptical curve cryptography has been suggested. The scheme has also been simulated in Scyther to validate it against various attacks.
机译:密钥协议是所有安全服务和原语的基石。非对称密码术是在不安全的通信通道上协商会话密钥的一种广泛采用的方法。物联网中基于椭圆曲线密码学的密钥协商中的非对称密码学的使用具有很大的研究兴趣。这归因于这样的事实,即基于ECC的加密技术的计算强度不如传统加密技术。计算效率使其适用于物联网和智慧城市应用中使用的资源约束设备。本文对事实上的密钥交换协议椭圆曲线Diffie-Hellman(ECDH)进行了评估并进行了正式验证。同时指出了ECDH的局限性。已经提出了一种基于椭圆曲线密码学的会话密钥协商方案。该方案还已在Scyther中进行了仿真,以针对各种攻击对其进行验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号