Secret Key Agreement without Public-Key Cryptography

Use of this thesis is restricted to the UNT Community. Off-campus users must log in to read.

Description

Secure communication is the primary challenge in today's information network. In this project an efficient secret key agreement protocol is described and analyzed along with the other existing protocols. We focus primarily on Leighton and Micali's secret-key agreement without the use of public-key encryption techniques. The Leighton-Micali protocol is extremely efficient when implemented in software and has significant advantages over existing systems like Kerberos. In this method the secret keys are agreed upon using a trusted third party known as the trusted agent. The trusted agent generates the keys and writes them to a public directory before it goes offline. ... continued below

Creation Information

Surapaneni, Smitha August 2003.

Context

This thesis is part of the collection entitled: UNT Student Graduate Works and was provided by UNT Libraries to Digital Library, a digital repository hosted by the UNT Libraries. It has been viewed 257 times . More information about this thesis can be viewed below.

Who

People and organizations associated with either the creation of this thesis or its content.

Chair

Publisher

Rights Holder

For guidance see Citations, Rights, Re-Use.

  • Surapaneni, Smitha

Provided By

UNT Libraries

With locations on the Denton campus of the University of North Texas and one in Dallas, UNT Libraries serves the school and the community by providing access to physical and online collections; The Portal to Texas History and UNT Digital Libraries; academic research, and much, much more.

Contact Us

What

Descriptive information to help identify this thesis. Follow the links below to find similar items on the Digital Library.

Degree Information

Description

Secure communication is the primary challenge in today's information network. In this project an efficient secret key agreement protocol is described and analyzed along with the other existing protocols. We focus primarily on Leighton and Micali's secret-key agreement without the use of public-key encryption techniques. The Leighton-Micali protocol is extremely efficient when implemented in software and has significant advantages over existing systems like Kerberos. In this method the secret keys are agreed upon using a trusted third party known as the trusted agent. The trusted agent generates the keys and writes them to a public directory before it goes offline. The communicating entities can retrieve the keys either from the online trusted agent or from the public directory service and agree upon a symmetric-key without any public-key procedures. The principal advantage of this method is that the user verifies the authenticity of the trusted agent before using the keys generated by it. The Leighton-Micali scheme is not vulnerable to the present day attacks like fabrication, modification or denial of service etc. The Leighton-Micali protocol can be employed in real-time systems like smart cards. In addition to the security properties and the simplicity of the protocol, our experiments show that in practice the time to generate keys is very low, and is faster than the Diffie-Hellman key exchange for the same problem.

Notes

Problem in Lieu of Thesis

Language

Collections

This thesis is part of the following collection of related materials.

UNT Student Graduate Works

This collection houses graduate student works other than theses and dissertations. All materials have been previously accepted by a professional organization or approved by a faculty mentor. The collection includes, but is not limited to problems in lieu of thesis, supplemental files associated with theses and dissertations, posters, recitals, presentations, articles, reviews, book chapters, and artwork. Some items in this collection are restricted to use by the UNT community.

What responsibilities do I have when using this thesis?

When

Dates and time periods associated with this thesis.

Creation Date

  • August 2003

Added to The UNT Digital Library

  • Feb. 15, 2008, 2:56 p.m.

Description Last Updated

  • March 24, 2016, 4:21 p.m.

Usage Statistics

When was this thesis last used?

Yesterday: 0
Past 30 days: 3
Total Uses: 257

Interact With This Thesis

Here are some suggestions for what to do next.

Start Reading

PDF Version Also Available for Download.

Citations, Rights, Re-Use

Surapaneni, Smitha. Secret Key Agreement without Public-Key Cryptography, thesis, August 2003; Denton, Texas. (digital.library.unt.edu/ark:/67531/metadc4249/: accessed September 23, 2017), University of North Texas Libraries, Digital Library, digital.library.unt.edu; .