Authenticated Key Agreement Protocols: A Comparative Study


One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.

Share and Cite:

Baalghusun, A. , Abusalem, O. , Abbas, Z. and Kar, J. (2015) Authenticated Key Agreement Protocols: A Comparative Study. Journal of Information Security, 6, 51-58. doi: 10.4236/jis.2015.61006.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Saha, M. and RoyChowdhury, D. (2009) Provably Secure Key Establishment Protocol Using One-Way Functions. Journal of Discrete Mathematical Sciences & Cryptography, 12, 139-158.
[2] Menezes, A., van Oorschot, P. and Vanstone, S. (2010) Handbook of Applied Cryptography. CRC Press, Boca Raton.
[3] Vesterås, B. (2006) Analysis of Key Agreement Protocols, 1-46.
[4] Dutta, R. and Barua, R. (2005) Overview of Key Agreement Protocols. Cryptology ePrint Archive, 1-46.
[5] Diffie, W. and Hellman, M. (1976) New Directions in Cryptography. IEEE Transaction on Information Theory, 22, 644-654.
[6] Mohamed, N., Yasmine, A., Galal, E. and Amr, A. (2013) New Authenticated Key Agreement Protocols. International Multi Conference of Engineering and Computer Scientists, 1, 58-63
[7] Elkamchouchi, H.M., Saleh, Y.A. and Sary, A.M. (2011) New Authenticated Key Agreement Protocols. International Conference on Computer Engineering & Systems (ICCES), Cairo, 29 November 2011-1 December 2011, 58-63.
[8] Boyd, C. and Mathuria, A. (2003) Protocols for Authentication and Key Establishment. Springer, Berlin, Heidelberg.
[9] Lopez, J. and Dahab, R. (2000) An Overview of Elliptic Curve Cryptography. Technical report, Institute of Computing, State University of Campinas, Brazil, 1-35.
[10] Kar, J. (2014) Provably Secure Online/Off-Line Identity-Based Signature Scheme for Wireless Sensor Network. International Journal of Network Security, Taiwan, 16, 26-36.
[11] Harn, L., Hsin, W.J. and Mehta, M. (2005) Authenticated Diffie-Hellman Key Agreement Protocol Using a Single Cryptographic Assumption. IEEE Proceeding of Communication, 152, 404-410.
[12] Wen, H.A., Lin, C.L. and Hwang, T. (2006) Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients. Computer & Security, 25, 106-113.
[13] Kar, J. (2014) A Novel Construction of Certificateless Signcryption Scheme for Smart Card. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-22, 437-456.
[14] Popescu, C. (2004) A Secure Authenticate Key Agreement Protocol. IEEE MELECON, Mediterranean, 12-15 May 2004, 783-786.
[15] Tseng, Y.M. (2005) Efficient Authenticated Key Agreement Protocols Resistant to a Denial-of-Service Attack. International Journal of Network Management, 15, 193-202.
[16] Yoon, E.J. and Yoo, K.Y. (2005) New Efficient Simple Authenticated Key Agreement Protocol. Computing and Combinatorics, 3595, 945-954.
[17] Nabil, M., Abouelseoud, Y., Elkobrosy, G. and Abdelrazek, A. (2013) Certificate-Based Authenticated Key Agreement Protocols. Proceeding of IEEE ICCAT, Computer Applications Technology (ICCAT), 2013 International Conference on Location City of Sousse, 20-22 January 2013, 1-7.
[18] Kar, J. (2014) Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks. In: Case Studies in Secure Computing Achievements and Trends, CRC Press, Taylor and Francis, New York, Chapter-04, 67-88.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.