Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak

Research output: Contribution to journalArticlepeer-review

25 Citations (Scopus)

Abstract

Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.

Original languageEnglish
Article number2160
Number of pages15
JournalSensors
Volume20
Issue number8
DOIs
Publication statusPublished - 2 Apr 2020

Bibliographical note

Publisher Copyright:
© 2020 by the authors. Licensee MDPI, Basel, Switzerland.

Fingerprint

Dive into the research topics of 'Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak'. Together they form a unique fingerprint.

Cite this