Please use this identifier to cite or link to this item: http://www.idr.iitkgp.ac.in/xmlui/handle/123456789/558
Title: Design and analysis of authenticated key establishment protocols
Authors: Saha, Mounita
Keywords: Cryptography
Key establishment protocols
Issue Date: 2010
Publisher: IIT Kharagpur
Abstract: In the current age of information communication, security is one of the most important concern which is attracting a lot of attention from the research community. Cryptography is a pivotal method to offer security to communication of various information. Authentication and key establishment protocols are cryptographic techniques that are the first steps to set up a secure communication by authenticating the users involved and establishing a secure key among them. The key can subsequently be used to offer various security services. In this thesis various new protocols for authentication and key establishment are proposed in order to enhance efficiency and security of communication. In the design of key establishment protocols, the use of cryptographic primitives requiring less computations are preferred to increase efficiency. Particularly, due to the popularity of applications in heterogeneous environments, protocols having less computational burden on the low power users have become essential. One of the design goals of the protocols proposed in the thesis is to provide an asymmetric computational pattern to enhance the overall efficiency. The security analysis of the protocols have been performed under provable security model.
Gov't Doc #: NB14182
URI: http://www.idr.iitkgp.ac.in/xmlui/handle/123456789/558
Appears in Collections:Design and analysis of authenticated key establishment protocols

Files in This Item:
File Description SizeFormat 
NB14182.pdf
  Restricted Access
PDF File1.6 MBAdobe PDFView/Open Request a copy
NB14182_Abstract.pdfPDF File193.91 kBAdobe PDFThumbnail
View/Open
NB14182_Chapter1.pdfPDF File245.13 kBAdobe PDFThumbnail
View/Open
NB14182_TOC.pdfPDF File211.81 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.