Lightweight authenticated key exchange (AKE) protocols based on symmetric-key cryptography are important in securing the Internet of Things (IoT). However, achieving perfect forward secrecy (PFS) is not trivial for AKE based on symmetric-key cryptography, as opposed to AKE based on public-key cryptography. The most recent proposals that provide PFS are SAKE and SAKE-AM. In this paper, we first take a closer look at these protocols and observe that they have some limitations, specially when deployed in the context of (industrial) IoT. Specifically, we show that if SAKE is used to establish parallel sessions between a server and multiple IoT nodes, then SAKE is susceptible to timeful attack. As for SAKE-AM, we show that an adversary can disru...
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We obse...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
Security in Industrial Internet of Things (IIoT) is of vital importance as there are some cases wher...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achiev...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Privacy-Preserving Authenticated Key Exchange (PPAKE) provides protection both for the session keys ...
This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) pro...
This paper gives definitions and results about password-based protocols for authenticated key exchan...
peer reviewedCurrently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdall...
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We obse...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
Security in Industrial Internet of Things (IIoT) is of vital importance as there are some cases wher...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. T...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achiev...
With the rise of the Internet of Things and the growing popularity of constrained devices, several s...
Privacy-Preserving Authenticated Key Exchange (PPAKE) provides protection both for the session keys ...
This paper suggests a model and a definition for forward-secure authenticated key exchange (AKE) pro...
This paper gives definitions and results about password-based protocols for authenticated key exchan...
peer reviewedCurrently, the Simple Password-Based Encrypted Key Exchange (SPAKE2) protocol of Abdall...
In this paper we study security definitions for authenticated key exchange (AKE) protocols. We obse...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...
The vast majority of communication on the Internet and private networks heavily relies on Public-key...