IDR - IIT Kharagpur

Design and analysis of authenticated key establishment protocols

Show simple item record

dc.contributor.author Saha, Mounita
dc.date.accessioned 2010-05-06T05:58:40Z
dc.date.available 2010-05-06T05:58:40Z
dc.date.issued 2010
dc.identifier.govdoc NB14182
dc.identifier.uri http://www.idr.iitkgp.ac.in/xmlui/handle/123456789/558
dc.description.abstract In the current age of information communication, security is one of the most important concern which is attracting a lot of attention from the research community. Cryptography is a pivotal method to offer security to communication of various information. Authentication and key establishment protocols are cryptographic techniques that are the first steps to set up a secure communication by authenticating the users involved and establishing a secure key among them. The key can subsequently be used to offer various security services. In this thesis various new protocols for authentication and key establishment are proposed in order to enhance efficiency and security of communication. In the design of key establishment protocols, the use of cryptographic primitives requiring less computations are preferred to increase efficiency. Particularly, due to the popularity of applications in heterogeneous environments, protocols having less computational burden on the low power users have become essential. One of the design goals of the protocols proposed in the thesis is to provide an asymmetric computational pattern to enhance the overall efficiency. The security analysis of the protocols have been performed under provable security model. en
dc.language.iso en en
dc.publisher IIT Kharagpur en
dc.subject Cryptography en
dc.subject Key establishment protocols en
dc.title Design and analysis of authenticated key establishment protocols en
dc.type Thesis en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account