Skip to main content

2024 | OriginalPaper | Buchkapitel

Key Agreement Using Symmetric Group

verfasst von : Prakersh Bajpai, Manoj Kumar Misra, Prashant Kumar Mishra, Shailendra Singh

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The utilization of key agreement protocols within the domain of cryptography is indispensable for ensuring secure and confidential communication across untrusted networks. This research paper offers a comprehensive exploration of the significance and application of key agreement protocols in modern cryptographic systems. Covering classical techniques like Diffie–Hellman and more recent advancements such as Elliptic Curve Diffie–Hellman, the paper examines their mathematical foundations and operational strengths. The security aspects of key agreement protocols are scrutinized, encompassing potential threats and vulnerabilities. The paper underscores the importance of thwarting attacks like man-in-the-middle, while emphasizing the role of forward secrecy and authentication mechanisms. Moreover, the paper investigates the adaptability of key agreement protocols in diverse scenarios, ranging from Internet communication to resource-constrained environments like IoT devices. By presenting a comparative analysis of various protocols, considering security, performance, and applicability, the paper aids decision-making for protocol selection. This research contributes to a comprehensive understanding of key agreement protocols, enabling practitioners to make informed choices in establishing resilient cryptographic channels amid evolving cybersecurity challenges.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Menezes J, Oorschot PCV, Vanstone SA (2001) Handbook of applied cryptography, 5th edn. CRC Press Inc., New York Menezes J, Oorschot PCV, Vanstone SA (2001) Handbook of applied cryptography, 5th edn. CRC Press Inc., New York
3.
Zurück zum Zitat Thakor VA, Razzaque MA, Khandaker MR (2021) Lightweight cryptography algorithms for resource constrained IoT devices: A review, comparison, and research opportunities. IEEE Access 9:28177–28193CrossRef Thakor VA, Razzaque MA, Khandaker MR (2021) Lightweight cryptography algorithms for resource constrained IoT devices: A review, comparison, and research opportunities. IEEE Access 9:28177–28193CrossRef
5.
Zurück zum Zitat Hamouda BEHH (2020) Comparative study of different cryptographic algorithms. J Inf Secur 11(3):138–148 Hamouda BEHH (2020) Comparative study of different cryptographic algorithms. J Inf Secur 11(3):138–148
6.
Zurück zum Zitat Kumari S (2017) A research paper on cryptography encryption and compression techniques. Int J Eng Comput Sci 6(4):20915–20919 Kumari S (2017) A research paper on cryptography encryption and compression techniques. Int J Eng Comput Sci 6(4):20915–20919
7.
Zurück zum Zitat Tan C, Ji Q (2016) An approach to identifying cryptographic algorithm from ciphertext. In: 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN). IEEE, pp 19–23 Tan C, Ji Q (2016) An approach to identifying cryptographic algorithm from ciphertext. In: 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN). IEEE, pp 19–23
9.
Zurück zum Zitat Savant VB, Kasar RD (2021) A review on network security and cryptography. Res J Eng Technol 12(4):110–114CrossRef Savant VB, Kasar RD (2021) A review on network security and cryptography. Res J Eng Technol 12(4):110–114CrossRef
11.
Zurück zum Zitat Rashid M, Kumar H, Khan SZ, Bahkali I, Alhomoud A, Mehmood Z (2022) Throughput/area optimized architecture for elliptic-curve Diffie-Hellman protocol. Appl Sci 12(8):4091CrossRef Rashid M, Kumar H, Khan SZ, Bahkali I, Alhomoud A, Mehmood Z (2022) Throughput/area optimized architecture for elliptic-curve Diffie-Hellman protocol. Appl Sci 12(8):4091CrossRef
12.
Zurück zum Zitat Farahmand F, Nguyen DT, Dang VB, Ferozpuri A, Gaj K (2019) Software/hardware codesign of the post quantum cryptography algorithm NTRUEncrypt using high-level synthesis and register-transfer level design methodologies. In: 2019 29th international conference on field programmable logic and applications (FPL). IEEE, pp 225–231 Farahmand F, Nguyen DT, Dang VB, Ferozpuri A, Gaj K (2019) Software/hardware codesign of the post quantum cryptography algorithm NTRUEncrypt using high-level synthesis and register-transfer level design methodologies. In: 2019 29th international conference on field programmable logic and applications (FPL). IEEE, pp 225–231
13.
Zurück zum Zitat Tayal S, Gupta N, Gupta P, Goyal D, Goyal M (2017) A review paper on network security and cryptography. Advances in Computational Sciences and Technology 10(5):763–770 Tayal S, Gupta N, Gupta P, Goyal D, Goyal M (2017) A review paper on network security and cryptography. Advances in Computational Sciences and Technology 10(5):763–770
15.
Zurück zum Zitat Bors A, Shalev A (2021) Words, permutations, and the nonsolvable length of a finite group. J Combin Algebra 5(2):93–122MathSciNetCrossRef Bors A, Shalev A (2021) Words, permutations, and the nonsolvable length of a finite group. J Combin Algebra 5(2):93–122MathSciNetCrossRef
16.
17.
Zurück zum Zitat Gordon J, Lopez-Paz D, Baroni M, Bouchacourt D (2019) Permutation equivariant models for compositional generalization in language. In: International Conference on Learning Representations Gordon J, Lopez-Paz D, Baroni M, Bouchacourt D (2019) Permutation equivariant models for compositional generalization in language. In: International Conference on Learning Representations
18.
Zurück zum Zitat Finzi M, Welling M, Wilson AG (2021) A practical method for constructing equivariant multilayer perceptrons for arbitrary matrix groups. In: International conference on machine learning. PMLR, pp 3318–3328 Finzi M, Welling M, Wilson AG (2021) A practical method for constructing equivariant multilayer perceptrons for arbitrary matrix groups. In: International conference on machine learning. PMLR, pp 3318–3328
Metadaten
Titel
Key Agreement Using Symmetric Group
verfasst von
Prakersh Bajpai
Manoj Kumar Misra
Prashant Kumar Mishra
Shailendra Singh
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_59

Neuer Inhalt