Academic
Publications
Diffie-Hellman Key Agreement Method

Diffie-Hellman Key Agreement Method,E. Rescorla

Diffie-Hellman Key Agreement Method   (Citations: 52)
BibTex | RIS | RefWorks Download
Published in 1999.
Cumulative Annual
    • ...If ephemeral or static Diffie-Hellman is used for client key exchange, the client generates its HOTP value, then it derives the negotiated key (Z) [6]...
    • ...2) Diffie-Hellman: After receiving the ClientKeyExchange message, the server retrieves the client Diffie-Hellman public value and generates the negotiated key (Z) [6]...
    • ...The negotiated key (Z) is used as the pre-master-secret [6], and is converted into the master-secret, as specified above...

    Balkis Hamdaneet al. Using the HMAC-Based One-Time Password Algorithm for TLS Authenticatio...

    • ...Generating such a secret key can be achieved using the Diffie-Hellman protocol [7] which has now become an RFC [8]...

    Martin Pereset al. On optimizing energy consumption: An adaptative authentication level i...

    • ...HIP uses cryptographic identifiers as the Namespace which helps to integrate baseline end-to-end security into the architecture when used with Diffie-Hellman [19] and appropriate security protocol, such as Encapsulated Security Payload (ESP) [20]...

    Ram Kumaret al. Towards a relation oriented service architecture

    • ...In this section we examine the vulnerability to small-subgroup attacks of an encryption-only mode in S/MIME (called “Enveloped-only” in [19]) when ephemeral-static Diffie-Hellman (as described in [20]) is used for key agreement...
    • ...For example, [20, Section 2.3] (see also [10, Section 4.1.1]) advises that some additional data, such as a counter, be appended to � prior to hashing to ensure that a different session key is generated even if the ephemeral key is being reused: “If, however, the same ephemeral sender key is used for multiple messages (e.g...
    • ...it is cached as a performance optimization) then a separate partyAInfo MUST be used for each message.” However, while [20] recommends that the recipient ˆ...
    • ...A validate the recipient’s static public key B. Section 2.1 of [23] explains that this protection is not necessary because a dishonest party ˆ...

    Alfred Menezeset al. On reusing ephemeral keys in Diffie-Hellman key agreement protocols

    • ...Many Group Key Agreement protocols [12, 13, 14, 15, 16, 17, 18, 19] have been proposed in the literature, most being derived from the two-party Diffie–Hellman (DH)[20] key agreement protocol...
    • ...The transmission range of each node is 20 m. We compare the performance of proposed protocol with the D-H [20]...

    Anoop Kumar Pandeyet al. Latency aware real time cryptographic communication model for MANET

Sort by: