Back to Search Start Over

Asymmetric disribution of computations in Internet Key Exchange Protocol

Authors :
Bahareh Taji
Mohammad M. Karbasioun
M. Berenjkub
Source :
2008 Canadian Conference on Electrical and Computer Engineering.
Publication Year :
2008
Publisher :
IEEE, 2008.

Abstract

IPsec security mechanism standard offers Internet key exchange protocol (IKEv2) for establishing and managing its secure sessions. In IKEv2 both two participants perform the same amount of calculations in all cases and this would cause some deficiencies, when it is used in different situations with different properties. For example in most of client-server connections it is more preferable for servers to do fewer operations in comparison with clients. In the other side in some connections, initiators are entities with less power of computing when comparing with responders. Mobile users are examples of such entities. In these connections, the initiators are the entities who need to perform fewer operations. To solve this problem, we propose two protocols with asymmetric schemes for distribution the calculations. In proposed protocols, one of the participants performs fewer computations, depending on the properties of connections. To achieve this asymmetric scheme, Schnorr signature scheme is used by the entity needs to perform fewer computations.

Details

ISSN :
08407789
Database :
OpenAIRE
Journal :
2008 Canadian Conference on Electrical and Computer Engineering
Accession number :
edsair.doi...........47ba11e3c294ca5d670354fc22befdd7