A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol
For Low Power Mobile Communications
Pierre E. ABI-CHAR, Abdallah MHAMED
UMR CNRS 5157
GET/Institut National des T· el· ecommunications
9 rue C. Fourier - 91011 Evry CEDEX - France
{pierre.abichar; abdallah.mhamed}@int-edu.eu
Bachar EL-HASSAN
Libanese University
Faculty of Engineering
Tripoli - Lebanon
bachar elhassan@ul.edu.lb
Abstract
The increasing progress in wireless mobile communica-
tion has attracted an important amount of attention on the
security issue. To provide secure communication for mo-
bile devices, authenticated key agreement protocol is an im-
portant primitive for establishing session key. So far, sev-
eral protocols have been proposed to provide robust mu-
tual authentication and key establishment for wireless lo-
cal area network (WLAN). In this paper we present a fast
and Secure Authenticated Key Agreement (EC-SAKA) pro-
tocol based on Elliptic Curve Cryptography. Our proposed
protocol provides secure mutual authentication, key estab-
lishment and key conrmation over an untrusted network.
The new protocol achieves many of the required security
and performance properties. It can resist dictionary attacks
mounted by either passive or active networks intruders. It
can resist Man-In-The Middle attack. It also offers perfect
forward secrecy which protects past sessions and passwords
against future compromise. In addition, it can resist known-
key and resilience to server attack. Our proposed protocol
uses ElGamal signature techniques (ECEGS). We show that
our protocol meets the above security attributes under the
assumption that the elliptic curve discrete logarithm prob-
lem is secure. Our proposed protocol offers signicantly im-
proved performance in computational and communication
load over comparably many authenticated key agreement
protocols such as B-SPEKE, SRP, AMP, PAK-RY, PAK-X,
SKA, LR-AKE and EC-SRP.
1 Introduction
In key agreement protocol two or more distributed en-
tities need to share some key in secret, called session key.
This session key can then be used to achieve some cryp-
tographic goal such as condential communication chan-
nel between entities or data integrity. There are two kinds
of key establishment protocols: Key transport protocols in
which a key is created by one entity and securely transmit-
ted to the second entity, and Key agreement protocols in
which both parties contribute information which jointly es-
tablish the shared key [14]. A key agreement protocol is
said to provide implicit key authentication if entity A is as-
sured that no other entity aside from a specically identi-
ed second entity B can possibly learn the value of a par-
ticular secret key. A key agreement protocol which pro-
vides implicit key authentication to both entities is called
an authenticated key agreement protocol. If both implicit
key authentication and key conrmation are provided, then
the key establishment protocol is said to provide explicit
key authentication. A key agreement protocol which pro-
vides explicit key authentication to both entities is called an
authenticated key agreement with key conrmation [14].
The security of Elliptic Curve cryptography relies on the
discrete logarithm problem over the points on an elliptic
curve. The best known methods to solve the Elliptic Curve
Discrete Logarithm Problem (ECDLP) are Pollard approach
and Pohlig-Hellman method. They are fully exponential
while the best known methods to solve the Integer Factor-
ization Problem (IFP) and the Discrete Logarithm Problem
(DLP), on which most of the non-ECC cryptosystems rely,
are sub-exponential. In fact, ECC can signicantly reduce
the computation and storage overhead.
In this paper we present a fast and secure three-pass au-
thenticated key establishment protocol for low power mo-
bile wireless devices that provides secure mutual authenti-
cation and key agreement with key conrmation. The EC-
SAKA (Secure Authenticated Key Agreement) is based on
the Elliptic Curve Cryptographgy [19], on the EC ElGamal
Signature Scheme (ECEGS), on SKA (Simple Key Agree-
ment) protocol [17] and on the assumption that the ECC
discrete logarithm problem is secure [19]. Our proposed
protocol achieves many of desirable security requirements
The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007)
0-7695-2878-3/07 $25.00 © 2007