Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

The proper verification of users plays a vital role during communication over a social network to protect the personal data of users. Multifarious protocols have been implemented to secure the confidential data of the users, but these protocols have various limitations and are incapable of providing secrecy of data against various attacks, such as replay and cryptanalysis attacks. In this article, the authors proposed a novel method for security verification of the social network model using an improved three-party authenticated key exchange (3PAKE) protocol based on symmetric encryption and (ECC) elliptic curve cryptography. The outcome of the paper demonstrates that our proposed algorithm provides the desired secrecy to the confidential data exchange over social networks in real-time and consumes less time in comparison to existing protocols. Our protocol consumes a search time of 0.09 s, overall communication steps took 2 during the verification, and depth plies was 3 along with 20 visited nodes. The 3PAKE protocol has been considered a suitable approach for social network secrecy during information exchange between user and server, thereby providing greater secrecy to the user in data exchange over social networks and more robustness against multifarious known attacks, such as cryptanalysis and replay attacks in real-time.

Cite

CITATION STYLE

APA

Sinha, V. K., Anand, D., Kaur, S., Singh, P., & Noya, I. D. (2022). Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol. Symmetry, 14(8). https://doi.org/10.3390/sym14081567

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free