CRYPTOGRAPHIC KEY COMMUNICATION PROTOCOL USING ELLIPTIC CURVE OVER FINITE FIELD WITH NESTED CONSTRUCTION OF HASH MESSAGE AUTHENTICATION CODE
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
B. Preneel and P. Van Oorschot On the security of two MAC algorithms Advanes in Cryptology EUROCRYPT 96, Proceedings Lecture Notes in Computer Science Vol. 1070 U. Maurer ed., Springer Verlag 1996.
A. Menzes, P. Van Oorschot and S. Vanstone Hand book of Applied Cryptography CRC Press 1997.
B. Song and K. Kim Two- pass Authenticated Key agreement protocol with key confirmation Progress in Cryptology INDOCRYPT LNCS 1977 Springer – Verlag pp 237-249, December 2000.
Simon Blake-Wilson, Don Johnson, Alfred Menezes “Key agreement protocols and their security analysisâ€, IMA International Conference on Cryptography and Coding
ANSI X9.63-1997, Elliptic Curve Key Agreement and Key Transport Protocols, October 1997, working draft.
B. den Boer, A. Bosselaeres, “Collosions for the Compression function of MD 5†Advances in Cryptology EUROCRYPT ’ 93 proceedings Springer – Verlag 1994.
X.Y. wang, F.D. Guo, X.J. Lai, H.B. Yu “Collisions for Hash functions MD 4, MD 5 HAVEL -128 and RIPEMD, rump session of CRYPTO’04 E-print 2004
“Hash Functions in Cryptography†Master of Science thesis Joseph Sterling Grah submitted to University I Bergen June 2008.
Junko Nakajima and Mitsuramatsui “Performnce Analysis and Parallel Implementation of dedicated hash functions†Proc. Of EUROCRYPT 2002 Lecture Notes in Computer Science 2332 Springer pp165-180 2002
Narn-Yih Lee, Chein – Nan Wu, “Authenticated multiple key exchange protocols based on Elliptic curves and blinear pairings†Computers & Electrical Engineering Volume 34, Issue 1, January 2008, Pages 12-20
Smart N.P. “The Discrete Logarithm on Problem on Elliptic Curve of Trace one†Journa of Cryptology 1999 Vol. 12, No.3, Page 193-196.