Ironwood meta key agreement and authentication protocol

Type: Article

Publication Date: 2020-04-13

Citations: 1

DOI: https://doi.org/10.3934/amc.2020073

Abstract

<p style='text-indent:20px;'>Number theoretic public-key solutions, currently used in many applications worldwide, will be subject to various quantum attacks, making them less attractive for longer-term use. Certain group theoretic constructs are now showing promise in providing quantum-resistant cryptographic primitives, and may provide suitable alternatives for those looking to address known quantum attacks. In this paper, we introduce a new protocol called a <i>Meta Key Agreement and Authentication Protocol</i> (MKAAP) that has some characteristics of a public-key solution and some of a shared-key solution. Specifically, it has the deployment benefits of a public-key system, allowing two entities that have never met before to authenticate without requiring real-time access to a third-party, but does require secure provisioning of key material from a trusted key distribution system (similar to a symmetric system) prior to deployment. We then describe a specific MKAAP instance, the Ironwood MKAAP, discuss its security, and show how it resists certain quantum attacks such as Shor's algorithm or Grover's quantum search algorithm. We also show Ironwood implemented on several "internet of things" (IoT devices), measure its performance, and show how it performs significantly better than ECC using fewer device resources.

Locations

  • Advances in Mathematics of Communications - View - PDF
  • arXiv (Cornell University) - View - PDF

Similar Works

Action Title Year Authors
+ Ironwood Meta Key Agreement and Authentication Protocol 2017 Iris Anshel
Derek Atkins
Dorian Goldfeld
Paul E. Gunnells
+ Ironwood Meta Key Agreement and Authentication Protocol 2017 Iris Anshel
Derek Atkins
Dorian Goldfeld
Paul E. Gunnells
+ PDF Chat Securing the future internet of things with post‐quantum cryptography 2021 Adarsh Kumar
Carlo Ottaviani
Sukhpal Singh Gill
Rajkumar Buyya
+ PDF Chat Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization 2024 Tao Liu
Gowri Ramachandran
Raja Jurdak
+ Post-Quantum Hybrid Digital Signatures with Hardware-Support for Digital Twins 2023 Saif E. Nouma
Attila A. Yavuz
+ PDF Chat A Practical Cryptanalysis of WalnutDSA$$^{\text {TM}}$$ 2018 Daniel Hart
Dohoon Kim
Giacomo Micheli
Guillermo Pascual-Perez
Christophe Petit
Yuxuan Quek
+ PDF Chat On the Role of Hash-Based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions 2020 Sabah Suhail
Rasheed Hussain
Abid Khan
Choong Seon Hong
+ The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks 2005 Karl Svozil
+ Scalable and Lightweight Post-Quantum Authentication for Internet of Things 2023 Attila A. Yavuz
Saleh Darzi
Saif E. Nouma
+ PDF Chat Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security 2024 Paul Staat
Meik Dörpinghaus
Azadeh Sheikholeslami
Christof Paar
Gerhard Fettweis
Dennis Goeckel
+ Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together 2023 Aleksey K. Fedorov
+ PDF Chat Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together 2023 Aleksey K. Fedorov
+ Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security 2023 Alvaro Cintas Canto
Jasmin Kaur
Mehran Mozaffari Kermani
Reza Azarderakhsh
+ Securing the Internet of Things (IoT) in the Quantum Era: Challenges and Future Directions for Quantum-Resistant Cryptography 2024 Maryam Alwashahi
Hothefa Jassim
Fadi Abdelfattah
+ Impact of Quantum Computing on Cryptography: Tracing Progress, Identifying Challenges, and Safeguarding Information in the Quantum Era 2024 Jitendra Kurmi
Vipin Rawat
Kulvinder Singh
+ PDF Chat Quantum Cryptography: an overview of Quantum Key Distribution 2024 Davide Rusca
Nicolas Gisin
+ PDF Chat Quantum cryptography beyond key distribution: theory and experiment 2024 Mathieu Bozzio
Claude Crépeau
Petros Wallden
Philip Walther
+ PDF Chat Distributed Symmetric Key Establishment: a Scalable Quantum-Safe Key Distribution Protocol 2024 Jie Lin
Hoi‐Kwong Lo
Jacob Johannsson
Mattia Montagna
Manfred von Willich
+ Key agreement, the Algebraic Eraser^{𝑇𝑀}, and lightweight cryptography 2006 Iris Anshel
Michael Anshel
Dorian Goldfeld
Stéphane Lemieux
+ Review of the NIST Light-weight Cryptography Finalists 2023 William J. Buchanan
Λέανδρος Μαγλαράς

Works That Cite This (0)

Action Title Year Authors