2008
DOI: 10.3844/ajassp.2008.777.782
|View full text |Cite
|
Sign up to set email alerts
|

A Password-Based Key Derivation Algorithm Using the KBRP Method

Abstract: This study presents a new efficient password-based strong key derivation algorithm using the key based random permutation the KBRP method. The algorithm consists of five steps, the first three steps are similar to those formed the KBRP method. The last two steps are added to derive a key and to ensure that the derived key has all the characteristics of a strong key. In order to demonstrate the efficiency of the algorithm, a number of keys are derived using various passwords of different content and length. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…This work presents a detailed description of the proposed Password-Based Digital Signature (PBDS) authentication scheme. It The PBDS scheme makes use of the KBRP method [8] and the PBKD algorithm [9] . In order to explain this new scheme, it is useful to provide a brief description of the KBRP and PBKD.…”
Section: The Proposed Password Authentication Schemementioning
confidence: 99%
See 1 more Smart Citation
“…This work presents a detailed description of the proposed Password-Based Digital Signature (PBDS) authentication scheme. It The PBDS scheme makes use of the KBRP method [8] and the PBKD algorithm [9] . In order to explain this new scheme, it is useful to provide a brief description of the KBRP and PBKD.…”
Section: The Proposed Password Authentication Schemementioning
confidence: 99%
“…Instead, a Password-Based Digital Signature (PBDS) is derived and transmitted over the network. This signature is derived using an efficient highly secure scheme that utilizes the Key Based Random Permutation (KBRP) method [8] and the Password-Based Key Derivation (PBKD) method [9] . The main features of the new scheme include:…”
Section: Introductionmentioning
confidence: 99%
“…This key could be used for securing further communication between the users. But it is weak in preventing man-in-the middle attack, since the entitie's identity are not included in the message while exchanging public keys (Hussain, 2008;Hsiang and Shih, 2009b).…”
Section: Introductionmentioning
confidence: 99%
“…The keys should be secretly generated and distributed. Diffie Hellman's (Hussain, 2008;Hsiang and Shih, 2009a) method is a well known key generation and authentication algorithm among public key cryptosystems. Accordingly using senders own private key and partner's public key, the shared session key could be calculated through discrete logarithm.…”
Section: Introductionmentioning
confidence: 99%