Highly efficient symmetric key based authentication and key agreement protocol using keccak

33Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly efficient protocols are needed. We propose in this paper two protocols enabling the construction of a mutual authenticated key ensuring anonymity and unlinkability of the client and resisting the most well known attacks. The main difference between the two proposed protocols is in the storage requirements on the server side. The innovation of our protocols relies on the fact that, thanks to the usage of the sponge construction, available in the newly proposed SHA3 standard with underlying Keccak design, the computation cost can be reduced to only one hash operation on the client side in case of the protocol with storage and two hash operations for the protocol without storage and thus leads to a very efficient solution.

Cite

CITATION STYLE

APA

Braeken, A. (2020). Highly efficient symmetric key based authentication and key agreement protocol using keccak. Sensors (Switzerland), 20(8). https://doi.org/10.3390/s20082160

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free