Secure Key Exchange Protocol

proposed scheme

Secure Key Exchange Protocol Based on Elliptic Curve and Security Models

The two communication parties need to exchange keys throughout their session in order to execute this mission

most efficient algorithms for securing data

Elliptic Curve-Diffie Hellman (ECDH)

more efficient than other traditional techniques such as Rivest–Shamir–Adleman (RSA) in terms of key size, computation and network bandwidth

AKA protocol which is based on the ideas of the hashed MQV (HMQV)

diffrent in

protocol generates the session keys based on both the static and the ephemeral keys whereas the previous work uses only the public ephemeral keys

Security analysis

protect againts

Known-Key Security

Replay

Forgery

Man-in-the-Middle Attack

Perfect Forward Secrecy

Key Compromise Impersonation

Unknown Key Share

Key Control

Ensure:

confidentiality

authentication

integrity

a two-pass protocol that produces nine keys per session and thus avoids the imperfect random generation and side channel attacks from the protection for a generated key based on static and ephemeral keys