Revisiting Shamir's no-key protocol: Lightweight key transport

2018-03-29
Key-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another for establishing a security association. In this paper, we propose a lightweight, practicable, tweakable, energy-efficient, and secure key-transport protocol, suitable forwireless sensor networks (WSN), Internet of Things (IoT) and mobile networks. The proposed protocol is based on the Shamir's no-key protocol. Although Shamir's no-key protocol does not require any pre-shared secret between principals, we show that it is impossible to employ the no-key protocol over publiccommutative groups. We modify Diffie-Hellman key-agreement protocol to morph it into a key-transport protocol by applying a set of changes on the original protocol and it becomes possible to compare both protocols in terms of memory usage and total time to accomplish a single key transport. The experimental results show that the proposed key transport protocol perform faster than the modified Diffie-Hellman protocol, and the total time to transport a single key by using the modified Diffie-Hellman protocol grows drastically with the increase in key size.

Suggestions

Revisiting Shamir’s no-key protocol: a lightweight key transport protocol
Kılıç, Adnan; Onur, Ertan; Betin Onur, Cansu; Department of Computer Engineering (2017)
Key-transport protocols, subclasses of key-establishment protocols, are employed to convey secret keys from a principal to another to let them establish a security association. In this thesis, we propose a lightweight, practicable, energy-efficient, and secure key-transport protocol, convenient for wireless sensor networks (WSN), the Internet of things (IoT) and mobile networks. The proposed protocol is based on the Shamir’s three-pass (no-key) protocol. Although Shamir’s three-pass protocol does not requir...
Implementation of an Enhanced Target Localization and Identification Algorithm on a Magnetic WSN
Baghaee, Sajjad; GÜRBÜZ, SEVGİ ZÜBEYDE; Uysal, Elif (2015-10-01)
Wireless sensor networks (WSNs) are ubiquitous in a wide range of applications requiring the monitoring of physical and environmental variables, such as target localization and identification. One of these applications is the sensing of ferromagnetic objects. In typical applications, the area to be monitored is typically large compared to the sensing radius of each magnetic sensor. On the other hand, the RF communication radii of WSN nodes are invariably larger than the sensing radii. This makes it economic...
Quantum Key Distribution and Recent Advancements
Demir, Nazlı Ceren; Yayla, Oğuz; Department of Cryptography (2021-2-10)
Güvenli anahtar değişiminin sağlanması simetrik anahtar ile şifrelemede önemli bir konudur. Kuantum bilgisayarların geliştirilmesiyle günümüzde kullanımda olan sistemlerin güvenlik ihtiyacını karşılamayacağı değerlendirilmektedir. Bu doğrultuda öne çıkan önemli bir araştırma konusu kuantum anahtar değişimidir. Bu bitirme projesi, ilk kuantum anahtar değişimi protokolü olan BB84 Protokolünü ve kuantum anahtar paylaşımında son dönemde meydana gelen gelişmeleri ele almaktadır.
Impossibility of Three Pass Protocol using Public Abelian Groups
Onur, Cansu Betin; Kılıç, Adnan; Onur, Ertan (2018-7-23)
Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The three-pass protocol is a key transport protocol developed by Adi Shamir in 1980 where Alice wants to transport a secret message to Bob over an insecure channel, and they do not have any pre-shared secret information. In this paper, we prove the impossibility of secret key transportation from a principal to another entity in a network by using the three pass protocol over public Abel...
Feature Extraction and Object Classification for Target Identification at Wireless Multimedia Sensor Networks
Civelek, Muhsin; Yilmazer, Cengiz; Yazıcı, Adnan; Korkut, Fazli Oncul (2014-04-25)
In this paper, it is investigated the processes for automatic identification of the targets without personnel intervention in wireless multimedia sensor networks. Methods to extract the features of the object from the multimedia data and to classify the target type based on the extracted features are proposed within the scope of this study. The success of the proposed methods are tested by implementing a Matlab application and the results are presented in this paper
Citation Formats
A. Kılıç and E. Onur, “Revisiting Shamir’s no-key protocol: Lightweight key transport,” 2018, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/46374.