TITLE:
Authenticated Key Agreement Protocols: A Comparative Study
AUTHORS:
Areej Omar Baalghusun, Olfa Fahad Abusalem, Zahra Abbas Al Abbas, Jayaprakash Kar
KEYWORDS:
Impersonation Resilience, Prime Factorization, ECDLP, Trapdoor Function
JOURNAL NAME:
Journal of Information Security,
Vol.6 No.1,
January
13,
2015
ABSTRACT: One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.