Post-quantum authentication in TLS 1.3: a performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

Authorization mechanism for MQTT-based Internet of Things

A Niruntasukrat, C Issariyapat… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
This paper presents the design and implementation of an authorization mechanism for
MQTT-based Internet of Things (IoT). The design is based on OAuth 1.0 a, which is an open …

The Dangers of Key Reuse: Practical Attacks on {IPsec}{IKE}

D Felsch, M Grothe, J Schwenk, A Czubak… - 27th USENIX Security …, 2018 - usenix.org
IPsec enables cryptographic protection of IP packets. It is commonly used to build VPNs
(Virtual Private Networks). For key establishment, the IKE (Internet Key Exchange) protocol …

Comparative analysis of internet key exchange protocols

SH Shaheen, M Yousaf… - … conference on information …, 2015 - ieeexplore.ieee.org
Internet Key Exchange (IKE) protocol is a vibrant component of Internet Security protocol
(IPSec). It plays a vital role to accomplish the tasks of negotiation and establishment of …

Improving the accuracy of signature authentication using the eight principles of yong

T Nishigori, J Kawamoto, K Sakurai - Proceedings of the 11th …, 2017 - dl.acm.org
The signature authentication on smartphones has been studied as a method to protect
personal information. Its authentication accuracy is a challenge due to restrictions such as …

[PDF][PDF] Proposal for the implementation of IPv6 in an operational IPv4 infrastructure

JES Santiago, CAS Venegas, JCH Velásquez… - Proceedings of the …, 2019 - laccei.org
Internet protocol Ipv6 is a technology created in the late 1990s, but it has not been
implemented in network infrastructures as expected. This paper presents the IPv6 protocol …

Efficient protection for a virtual private network

K Mestery, G Bartlett - US Patent 11,558,354, 2023 - Google Patents
Techniques are described to provide efficient protection for a virtual private network. In one
example, a method is provided that includes obtaining a packet at a first network entity; …

Method for internet key exchange protocol authentication using certificate and communication device

D Sheng, H Ye, S Wenbin - US Patent App. 17/946,542, 2023 - Google Patents
This application discloses a method for Internet key exchange protocol (IKE) authentication
using a certificate. The method includes: A first device parses a certificate to obtain signature …

[PDF][PDF] Towards a Verifiably Secure Quantum-Resistant Key Exchange in IKEv2

QRK Exchange - mnm-team.org
Recent breakthroughs in the field of quantum computing have sparked fears that the
cryptographic methods we rely on every day may be broken in the near future. Even worse …

Security of access and usage of Cloud infrastructures

D Felsch - 2019 - hss-opus.ub.ruhr-uni-bochum.de
The use of Cloud services usually means that sensitive data is stored unencrypted on
servers on the Internet where the data is at risk. A common proposal to counter these risks is …