Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Authentication and Key Agreement AKA
Post: #1

AKA stands for the Authentication and Key Agreement security protocol. It is a mechanism which performs authentication and session key distribution in Universal Mobile Telecommunications System (UMTS) networks. AKA is a challenge-response based mechanism that uses symmetric cryptography. AKA is typically run in a UMTS IM Services Identity Module (ISIM), which resides on a smart card like device that also provides tamper resistant storage of shared secrets.

Exponential key exchange

The first publicly knownbpublic-key agreement protocol that meets the above criteria was the Diffie-Hellman exponential key exchange, in which two people jointly exponentiate a generator with random numbers, in such a way that an eavesdropper has no way of guessing what the key is.However, exponential key exchange in and of itself does not specify any prior agreement or subsequent authentication between the participants. It has thus been described as an anonymous key agreement protocol.


Anonymous key exchange, like Diffie-Hellman, does not provide authentication of the parties, and is thus vulnerable to Man-in-the-middle attacks.A wide variety of cryptographic authentication schemes and protocols have been developed to provide authenticated key agreement to prevent man-in-the-middle and related attacks. These methods generally mathematically bind the agreed key to other agreed-upon data, such as:
Public/private key pairs , Shared secret keys , Passwords

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sample sales marketing agreement, authentication and key agreement ppt, key agreement ppt, the key teachings, key agreement, gore vidal key, rental agreement template,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 2,101 31-10-2015 02:16 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 67,060 03-04-2014 11:39 PM
Last Post: seminar report asees
  Public Key Cryptography and the RSA algorithm seminar class 1 1,699 23-11-2012 11:32 AM
Last Post: seminar details
  authentication based on IRIS RECOGNITION Computer Science Clay 2 2,541 25-02-2012 11:08 AM
Last Post: seminar paper
  Biometrics Based Authentication Systems (Download Full Abstract And Report) computer science crazy 8 5,510 19-01-2012 04:11 PM
Last Post: odogu
  Pluggable Authentication Modules (Pam) computer science crazy 3 2,047 03-04-2011 06:08 PM
Last Post: christine
  KEY AND MESSAGE EXCHANGE seminar class 0 439 02-04-2011 10:09 AM
Last Post: seminar class
Last Post: seminar class
  Literature Review on “ A Secure Key Management Model For Wireless Mesh Networks seminar class 0 1,483 03-03-2011 03:01 PM
Last Post: seminar class
  USER AUTHENTICATION WITH TYPING PATTERN RECOGNITION seminar surveyer 6 3,807 02-02-2011 09:34 PM
Last Post: summer project pal