Authenticated Key Agreement Protocols: A Comparative Study

HTML  XML Download Download as PDF (Size: 3011KB)  PP. 51-58  
DOI: 10.4236/jis.2015.61006    4,698 Downloads   6,398 Views  Citations

ABSTRACT

One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.

Share and Cite:

Baalghusun, A. , Abusalem, O. , Abbas, Z. and Kar, J. (2015) Authenticated Key Agreement Protocols: A Comparative Study. Journal of Information Security, 6, 51-58. doi: 10.4236/jis.2015.61006.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.