Augmented encrypted key exchange using RSA encryption

Ari Musriami Barmawi, Shingo Takada, Norihisa Doi

Research output: Contribution to conferencePaperpeer-review

2 Citations (Scopus)

Abstract

The Augmented Encrypted Key Exchange (A-EKE) uses a shared secret key for encryption. A-EKE uses the hash of sender's password as the shared secret key. By using Simmon's Attack the sender's password can be broken. If this is accomplished, the attacker is able to know the communicating parties' session key used after authentication as well as in the authentication of the sender. Furthermore, using the broken session key and the password, the attacker can impersonate the real sender. To prevent this from happening, we propose a method to keep the session key and sender's password secret even if the attacker can break the shared secret key. This is accomplished by using RSA encryption. In our proposed scheme we use public keys which will be kept by the communicating parties and will be exchanged indirectly, i.e. instead of sending the whole public key, the two parties will send the number which determines their public key, along with the shared key.

Original languageEnglish
Pages490-494
Number of pages5
Publication statusPublished - 1997 Dec 1
EventProceedings of the 1997 International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'97. Part 2 (of 3) - Helsinki, Finl
Duration: 1997 Sept 11997 Sept 4

Other

OtherProceedings of the 1997 International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'97. Part 2 (of 3)
CityHelsinki, Finl
Period97/9/197/9/4

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Augmented encrypted key exchange using RSA encryption'. Together they form a unique fingerprint.

Cite this