Vestnik Yuzhno-Ural'skogo Gosudarstvennogo Universiteta. Seriya "Vychislitelnaya Matematika i Informatika"
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. YuUrGU. Ser. Vych. Matem. Inform.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik Yuzhno-Ural'skogo Gosudarstvennogo Universiteta. Seriya "Vychislitelnaya Matematika i Informatika", 2020, Volume 9, Issue 1, Pages 5–19
DOI: https://doi.org/10.14529/cmse200101
(Mi vyurv228)
 

Development and implementation of the conference secret key generation protocol based on IKE

A. A. Volokhov, Yu. V. Kosolapov

Southern Federal University (Bolshaya Sadovaya 105/42, Rostov-on-Don, 344006 Russia)
References:
Abstract: The protocol for generating a shared secret key often acts as the basis for informational interaction of participants in an untrusted environment. With the help of such a key, a secure channel or a secure communication network can be built in further interactions. Currently, the task of developing protocols for generating a shared key for a group of participants is relevant. One way to build such protocols is to generalize the protocol for two participants to the case of several participants. In the paper a protocol for generating a shared secret key for a group of participants (for a conference) is developed. The developed protocol is based on the Internet Key Exchange (IKE) protocol from the IPSec family of protocols for two participants, which ensures the implementation of security properties, such as authentication of the subject and message, generation of new keys, protection against reading back, protection against repetition, and a number of others. The strength of the developed key generation protocol is based on the complexity of the discrete logarithm problem in a cyclic group. The work studies the security properties provided by the constructed protocol, in particular, it studies the resistance to coalition attacks that are relevant for group protocols. Some features of the practical application of the constructed protocol are also noted.
Keywords: private key generation, IKE, conference.
Received: 16.07.2019
Document Type: Article
UDC: 004.056.55, 512.54
Language: Russian
Citation: A. A. Volokhov, Yu. V. Kosolapov, “Development and implementation of the conference secret key generation protocol based on IKE”, Vestn. YuUrGU. Ser. Vych. Matem. Inform., 9:1 (2020), 5–19
Citation in format AMSBIB
\Bibitem{VolKos20}
\by A.~A.~Volokhov, Yu.~V.~Kosolapov
\paper Development and implementation of the conference secret key generation protocol based on IKE
\jour Vestn. YuUrGU. Ser. Vych. Matem. Inform.
\yr 2020
\vol 9
\issue 1
\pages 5--19
\mathnet{http://mi.mathnet.ru/vyurv228}
\crossref{https://doi.org/10.14529/cmse200101}
Linking options:
  • https://www.mathnet.ru/eng/vyurv228
  • https://www.mathnet.ru/eng/vyurv/v9/i1/p5
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Vestnik Yuzhno-Ural'skogo Gosudarstvennogo Universiteta. Seriya "Vychislitelnaya Matematika i Informatika"
    Statistics & downloads:
    Abstract page:191
    Full-text PDF :73
    References:27
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024