web analytics

. B A SIP-based call between two parties may be desirable for security to be established by mutual agreement or for each party to establish security for its own outflows. A key memorandum of understanding is usually called after two parties have been authenticated. The common key agreement allows parties to communicate safely via unreliable communication networks. Commonly used key agreement protocols include diffie-hellman or protocols based on the RSA or ECC. FC-SP is a security image work that contains protocols to improve the security of fiber chains in several areas, including fiber chain device authentication, cryptographically secure key exchange and secure cryptographic communication between Fiber chain devices. FC-SP focuses on data protection during transmission across the Fibre Channel network. FC-SP is not interested in the security of data stored on the De Fibre Channel network. Ingemarsson, Tang and Wong introduced the first GKA protocol in 1982 [20] on the basis of the key two-headed Diffie Hellman agreement [19]. Followed by koyama and Ohta [24], Blundo et al.

[6] and Burmester and Desmedt [15]. Since then, a great deal of research on CPA and the security of ACA protocols has been presented, in part because of the distributed and dynamic nature of the ACA and the security challenges to be solved – see z.B. [1, 5, 7, 8, 9, 10, 11, 12, 13, 16, 18, 23, 26, 27, 28, 29, 30, 31, 33, 34], and… A large number of cryptographic authentication schemes and protocols have been designed to provide authenticated key agreements to prevent man-in-the-middle and related attacks. These methods generally mathematically link the agreed key to other agreed data, such as. B: For hardware insulation at the hardware level, a very isolated computer environment (SICE) has been proposed in [AZA 11] that provides an isolated hardware-level execution environment for x86 hardware platforms. It aims to provide a viable solution for sharing material resources with an isolated implementation environment. SICE does not rely on software components in the host environment (OS, Hypervisor), but the security of the isolated environment depends on the IT base (TCB) (includes only hardware, BIOS and system management mode (SMM)). According to the SICE design, it uses the hardware protection function of the standard X86 processor to create isolated running environments, z.B. using System Management RAM (SMRAM) for memory insulation.

After being initiated by the BIOS, the SMRAM can be locked so that no software can access the content other than the SMM code. Within the SMRAM are the following two modules: two PAKE (FOUR-Party Password Authentication Key Exchange , PAKE) protocols :: one is the four-part authentication protocol (KTAP) and the other is the KaAP (Four-Party Key Agreement Authentication Protocol). However, there is a downside to this protocol, as it could be a vulnerable point of attack, while it cannot support legal eavesdropping. The Key Agreement Group (GKA) is an extension of the two-party agreement to groups of no ≥ 2 parties: it allows a group composed of several parties to set up a common meeting key (key) or a conference key via an unprotected network.