Ironwood meta key agreement and authentication protocol

2Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Number theoretic public-key solutions, currently used in many applications worldwide, will be subject to various quantum attacks, making them less attractive for longer-term use. Certain group theoretic constructs are now showing promise in providing quantum-resistant cryptographic primitives, and may provide suitable alternatives for those looking to address known quantum attacks. In this paper, we introduce a new protocol called a Meta Key Agreement and Authentication Protocol (MKAAP) that has some characteris-tics of a public-key solution and some of a shared-key solution. Specifically, it has the deployment benefits of a public-key system, allowing two entities that have never met before to authenticate without requiring real-time access to a third-party, but does require secure provisioning of key material from a trusted key distribution system (similar to a symmetric system) prior to deployment. We then describe a specific MKAAP instance, the Ironwood MKAAP, discuss its security, and show how it resists certain quantum attacks such as Shor’s algorithm or Grover’s quantum search algorithm. We also show Ironwood implemented on several “internet of things” (IoT devices), measure its perfor-mance, and show how it performs significantly better than ECC using fewer device resources.

Cite

CITATION STYLE

APA

Anshel, I., Atkins, D., Goldfeld, D., & Gunnells, P. E. (2021). Ironwood meta key agreement and authentication protocol. Advances in Mathematics of Communications, 15(3), 397–413. https://doi.org/10.3934/amc.2020073

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free