0% found this document useful (0 votes)
68 views10 pages

05 Contents

This document contains a table of contents for a thesis on cryptography. The table of contents lists 10 chapters, including an introduction discussing cryptography concepts like symmetric and asymmetric encryption, hash functions, and security services. It also lists chapters on literature review, research methodology covering encrypted key exchange protocols, experimental results and analysis, and conclusions.

Uploaded by

Sravya Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views10 pages

05 Contents

This document contains a table of contents for a thesis on cryptography. The table of contents lists 10 chapters, including an introduction discussing cryptography concepts like symmetric and asymmetric encryption, hash functions, and security services. It also lists chapters on literature review, research methodology covering encrypted key exchange protocols, experimental results and analysis, and conclusions.

Uploaded by

Sravya Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

vii

TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO.

ABSTRACT iii
LIST OF TABLES xi
LIST OF FIGURES xii
LIST OF ABBREVIATIONS xv

1. INTRODUCTION 1
1.1 CRYPTOGRAPHY 1
1.2 SYMMETRIC KEY CRYPTOGRAPHY 2
1.3 ASYMMETRIC KEY CRYPTOGRAPHY 3
1.4 HASH FUNCTION 5
1.5 SECURITY SERVICES 8
1.5.1 Authentication 8
1.5.2 Access control 9
1.5.3 Data confidentiality 9
1.5.4 Data Integrity 9
1.5.5 Nonrepudiation 10
1.5.6 Availability service 10
1.6 KEY EXCHANGE 10
1.6.1 Key 10
1.6.2 Key Exchange 11
1.6.3 Key Exchange Protocol 12
1.6.4 Key Management 13
1.6.5 Password authenticated Key Exchange 14
1.6.6 Encrypted Key Exchange Protocol 15
viii

CHAPTER NO. TITLE PAGE NO.

1.7 ATTACKS 16
1.7.1 Active Attacks 18
1.7.2 Passive Attacks 19
1.7.3 Password guessing Attack 20
1.8 MOTIVATION 23
1.9 OBJECTIVESOF THIS STUDY 24
1.10 ORGANIZATION OF THE THESIS 24

2. LITERATURE REVIEW 25

3. RESEARCH METHODOLOGY 59
3.1 INTRODUCTION 59
3.2 ENCRYPTED KEY EXCHANGE PROTOCOL 59
3.2.1 Notations 60
3.2.2 Procedure 61
3.3 UNDETETABLE PASSWORD GUESSING
ATTACK ON EKE 68
3.4 MATHEMATICAL BACKGROUND 73
3.5 DESCRIPTION OF SYMMETRIC AND
ASYMMETRIC ENCRYPTION 76
3.5.1 Symmetric Encryption 76
3.5.2 Asymmetric Encryption 77
3.5.3 Switch Function 82
3.5.4 Encryption Function 83
3.5.5 Key generation function 86
3.5.6 Trapdoor function 91
ix

CHAPTER NO. TITLE PAGE NO.

4 SECURE THREE PARTY KEY EXCHANGE


PROTOCOL 95
4.1 INTRODUCTION 95
4.2 PARALLEL MESSAGE TRANSMISSION 95
4.3 ATTACK RESISTANT KEY EXCHANGE
PROTOCOL 97
4.3.1 Flow Chart 100
4.3.2 Procedure for secure key exchange
protocol 102
4.4 SECURITY AND EFFICIENCY
ANALYSIS 108
4.4.1 Security Requirements 108
4.4.1.1Mutual Authentication 108
4.4.1.2 Resistance to password guessing
Attacks 109
4.4.1.3 Transmission Round and
Computation complexity 114
4.4.1.4 Practicality 115

5. EXPERIMENTAL RESULTS 116


5.1 INTRODUCTION 116
5.2 EXPERIMENTAL ENVIRONMENT 116
5.3 PROCEDURE FOR EXECUTING
PROPOSED PROTOCOL 117
5.4 RESULT AND DISCUSSION 119
5.4.1 Running time for trapdoor function 120
5.4.2 Running time for NA, & KAS 122
5.4.3 Running time for EPWA(NA) 125
x

CHAPTER NO. TITLE PAGE NO.

5.5 PERFORMANCE MEASURES 127


5.5.1 Security 127
5.5.2 Efficiency 128
5.5.3 Reduced Transmission Round 131

6. CONCLUSION AND SCOPE FOR


FUTURE RESEARCH 148
6.1 INTRODUCTION 148
6.2 CONCLUSIONS 148
6.3 SUGGESTIONS FOR FUTURE WORK 150

REFERENCES 151

LIST OF PUBLICATIONS 158

CURRICULUM VITAE 159


xi

LIST OF TABLES

TABLE NO. TITLE PAGE NO.

5.1 Running time for TDF(FS(rA)) 120


5.2 Example for TDF 121
5.3 Running time for calculating NA,KAS 123
5.4 Running time for EPWA(NA) 126
xii

LIST OF FIGURES

FIGURE NO. TITLE PAGE NO.

1.1 Encryption and Decryption 2


1.2 Symmetric-key cryptography 8
1.3 Asymmetric-key cryptography 10
1.4 Hash Function cryptography 11
1.5 Active Security Attacks 12
1.6 Passive Security Attacks 13
1.7 Password guessing Attacks 22
3.1 Message from Client A to Client B 62
3.2 Message from Client B to Server 63
3.3 Message from Server to Client B 64
3.4 Message from Client B to Client A 64
3.5 Session Key Exchange 65
3.6 Session Key verification 66
3.7 Encrypted Key Exchange protocol 67
3.8 Undetectable password guessing attack on EKE 69
3.9 Impersonation attack on EKE 70
3.10 Switch function 83
3.11 Encryption Details 84
3.12 Initial permutation (IP) 85
3.13 Expansion/Permutation (E/P) 86
3.14 Key Generation 87
3.15 P10 Permutation 88
3.16 P8 Permutation 89
3.17 Left shift (LS-1) function 89
xiii

FIGURE NO. TITLE PAGE NO.

3.18 Left shift (LS-2) function 90


3.19 Substitution Boxes 90
4.1 Flow chart for secure key exchange protocol 101
4.2 (a) Authentication request from client A to server 102
(b) Authentication request from client B to server 103
4.3 (a) Authentication response from server to client A 104
(b) Authentication response from server to client B 104
4.4 session key exchange by client B 105
4.5 session key exchange by client A 106
4.6 Secure three party key exchange protocol 107
5.1 Graphical representation of the Running time
for TDF(FS(rA)) 121
5.2 Graphical representation of the Running time
for NA&KAS 125
5.3 Graphical representation of the Running time
for EPWA(NA) 126
5.4 Comparison of Fs(rA) 128
5.5 Comparison of NA 129
5.6 Comparison of KAS 130
5.7 Comparison of EPWA(NA) 131
5.8 Transmission round Comparison 132

5.9 Performance Analysis 133


5.10 Hash, cipher text calculated by Client A 134
5.11 Cipher text 1 collected by Server 135
5.12 Cipher text 2 collected by Server 136
5.13 Hash value calculated by Server 137
5.14 Client A is authenticated by server 138
5.15 Client B is authenticated by server 138
xiv

FIGURE NO. TITLE PAGE NO.

5.16 cipher text collected by server from client B 140


5.17 Selecting Rs by Server 141
5.18 NARS calculated by client A 142
5.19 Calculating key by Client A 143
5.20 Calculating key by Client B 144
5.21 Key obtained by Client A 145
5.22 Key obtained by Client B 146
xv

LIST OF ABBREVIATIONS

2 PEKE - Two- Party Encrypted Key Exchange


3PEKE - Three-Party Encrypted Key Exchange
A-EKE - Augmented Encrypted Key Exchange
AES - Advanced Encryptions Standard
AKE - Authenticated Key Exchange
ATDF - Adaptive Trapdoor Functions
AVISPA - Automated Validation of Internet Security Protocols
and Applications
CCDH - Chosen Based Computational Diffie Hellman
DDH - Decision Diffie- Hellman
DES - Data Encryptions Standard
DHEKE - Diffie-Hellman Encrypted Key Exchange
ECC - Elliptic curve cryptography
EC-PAKA - Elliptic Curve Based PAKA
EKE - Encrypted Key Exchange
HAVAL - HAsh of VAriable Length
J-PAKE - Password authenticated key exchange by Juggling
KAAP - Key Agreement Authentication Protocol
KDC - key Distribution Center
KTAP - Key Transfer Authentication Protocol
MD - Message Digest
MPI - Message Passing Interface
OTTOWF - One-Time Trapdoor One-Way Functions
OW-TDF - One-Way Trapdoor Functions
PAKA - Password authenticated key Argument
PAKE - Password authenticated key exchange
PFS - Perfect forward Security
PKI - Public Key Infrastructure
xvi

PRF - Pseudo Random Function


RACE - Rapid off-line Crypto Equipment
RC4 - Ron's Code 4
RIPE - RACE Integrity Primitives evaluation
RSA - Rivest Adi Shamir
SHA - Secure Hash Algorithm
SHS - Secure Hash Standard
SPAKE - Simple Password Based Authenticated Key Exchange
SPEKE - Simple Password exponential Key Exchange
SSL - Secure Socket Layer
STS - Station-To-Station
TCP - Transmission Control Protocol
TDF - Trapdoor Function
TLS - Transport Layer Security

You might also like