A hybrid session key exchange algorithm for highly-sensitive IP-based institutional communications

Zheng Yun Zhuang, Yi Chang Hsu, Kimmo Nurmi, Yung Chih Chen, Hsing Hua Liu, Tzu Shan Tseng

Research output: Contribution to journalArticle

Abstract

Session key exchange has become an addressed topic in the field of communications security, particularly for the IP-based call session that travels through the public network. This paper proposes a hybrid algorithm for session key exchange. The algorithm is designed based on most of the well-proven algorithms, including RSA, D-H, MAC authentication and SHA one-way function, and most of the popular security concepts such as digital signature, digital certificates and verifications under PKI. With an integration of these security concepts and algorithms, the proposed algorithm inherits the properties of these algorithms and realizes highly secure session key exchanging, to meet the required security level of institutions for sensitive communications. It not only improves the possible deficiencies of the algorithms that are singly based on RSA or D-H, but also expands the limits when a hybrid algorithm is applied. Moreover, using MAC codes to ensure the authenticity of the call itself (in addition to ensuring the authenticity of the call parties) meets the communications security concern (in addition to the information security concerns) which relevant algorithms might fail to consider.

Original languageEnglish
Pages (from-to)273-283
Number of pages11
JournalMicrosystem Technologies
Volume24
Issue number1
DOIs
Publication statusPublished - Jan 1 2018

Fingerprint

communication
Communication
Electronic document identification systems
exchanging
Security of data
Authentication
travel
signatures

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this

A hybrid session key exchange algorithm for highly-sensitive IP-based institutional communications. / Zhuang, Zheng Yun; Hsu, Yi Chang; Nurmi, Kimmo; Chen, Yung Chih; Liu, Hsing Hua; Tseng, Tzu Shan.

In: Microsystem Technologies, Vol. 24, No. 1, 01.01.2018, p. 273-283.

Research output: Contribution to journalArticle

Zhuang, Zheng Yun ; Hsu, Yi Chang ; Nurmi, Kimmo ; Chen, Yung Chih ; Liu, Hsing Hua ; Tseng, Tzu Shan. / A hybrid session key exchange algorithm for highly-sensitive IP-based institutional communications. In: Microsystem Technologies. 2018 ; Vol. 24, No. 1. pp. 273-283.
@article{bf78f28da08f4f94b17ddb781acbc49d,
title = "A hybrid session key exchange algorithm for highly-sensitive IP-based institutional communications",
abstract = "Session key exchange has become an addressed topic in the field of communications security, particularly for the IP-based call session that travels through the public network. This paper proposes a hybrid algorithm for session key exchange. The algorithm is designed based on most of the well-proven algorithms, including RSA, D-H, MAC authentication and SHA one-way function, and most of the popular security concepts such as digital signature, digital certificates and verifications under PKI. With an integration of these security concepts and algorithms, the proposed algorithm inherits the properties of these algorithms and realizes highly secure session key exchanging, to meet the required security level of institutions for sensitive communications. It not only improves the possible deficiencies of the algorithms that are singly based on RSA or D-H, but also expands the limits when a hybrid algorithm is applied. Moreover, using MAC codes to ensure the authenticity of the call itself (in addition to ensuring the authenticity of the call parties) meets the communications security concern (in addition to the information security concerns) which relevant algorithms might fail to consider.",
author = "Zhuang, {Zheng Yun} and Hsu, {Yi Chang} and Kimmo Nurmi and Chen, {Yung Chih} and Liu, {Hsing Hua} and Tseng, {Tzu Shan}",
year = "2018",
month = "1",
day = "1",
doi = "10.1007/s00542-016-3263-y",
language = "English",
volume = "24",
pages = "273--283",
journal = "Microsystem Technologies",
issn = "0946-7076",
publisher = "Springer Verlag",
number = "1",

}

TY - JOUR

T1 - A hybrid session key exchange algorithm for highly-sensitive IP-based institutional communications

AU - Zhuang, Zheng Yun

AU - Hsu, Yi Chang

AU - Nurmi, Kimmo

AU - Chen, Yung Chih

AU - Liu, Hsing Hua

AU - Tseng, Tzu Shan

PY - 2018/1/1

Y1 - 2018/1/1

N2 - Session key exchange has become an addressed topic in the field of communications security, particularly for the IP-based call session that travels through the public network. This paper proposes a hybrid algorithm for session key exchange. The algorithm is designed based on most of the well-proven algorithms, including RSA, D-H, MAC authentication and SHA one-way function, and most of the popular security concepts such as digital signature, digital certificates and verifications under PKI. With an integration of these security concepts and algorithms, the proposed algorithm inherits the properties of these algorithms and realizes highly secure session key exchanging, to meet the required security level of institutions for sensitive communications. It not only improves the possible deficiencies of the algorithms that are singly based on RSA or D-H, but also expands the limits when a hybrid algorithm is applied. Moreover, using MAC codes to ensure the authenticity of the call itself (in addition to ensuring the authenticity of the call parties) meets the communications security concern (in addition to the information security concerns) which relevant algorithms might fail to consider.

AB - Session key exchange has become an addressed topic in the field of communications security, particularly for the IP-based call session that travels through the public network. This paper proposes a hybrid algorithm for session key exchange. The algorithm is designed based on most of the well-proven algorithms, including RSA, D-H, MAC authentication and SHA one-way function, and most of the popular security concepts such as digital signature, digital certificates and verifications under PKI. With an integration of these security concepts and algorithms, the proposed algorithm inherits the properties of these algorithms and realizes highly secure session key exchanging, to meet the required security level of institutions for sensitive communications. It not only improves the possible deficiencies of the algorithms that are singly based on RSA or D-H, but also expands the limits when a hybrid algorithm is applied. Moreover, using MAC codes to ensure the authenticity of the call itself (in addition to ensuring the authenticity of the call parties) meets the communications security concern (in addition to the information security concerns) which relevant algorithms might fail to consider.

UR - http://www.scopus.com/inward/record.url?scp=85010976460&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85010976460&partnerID=8YFLogxK

U2 - 10.1007/s00542-016-3263-y

DO - 10.1007/s00542-016-3263-y

M3 - Article

VL - 24

SP - 273

EP - 283

JO - Microsystem Technologies

JF - Microsystem Technologies

SN - 0946-7076

IS - 1

ER -