Malaysian Journal of Mathematical Sciences, December 2021, Vol. 15(S)
Special Topics: New Ideas in Cryptology


A Chronological Review of Key Establishment Models and Protocols

Yap, E. Y. Y., Chin, J. J., and Goh, A.

Corresponding Email: ernestyyy0306@gmail.com

Received date: 15 June 2021
Accepted date: 8 October 2021

Abstract:
This work is a review on existing authenticated key exchange (AKE) security models and protocols mainly based on Diffie-Hellman Key Exchange (DHKE). We provide a discussion on the various security models of AKEs, such as the Bellare Rogaway (BR) model, Canetti Krawczyk (CK) model and their variants. Then we provide a review covering over ninety protocols in chronological order. The security models' security features and protocol examples that fit in those security models are exhibited.

Keywords: security models; Bellare-Rogaway; Canetti-Krawczyk; authenticated key exchange; protocols; review

  



Indexing



















SCImago Journal & Country Rank

Flag Counter