Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine

Mohd Anuar Mat Isa, Miza Mumtaz Ahmad, Nor Fazlida Mohd Sani, Habibah Hashim, Ramlan Mahmod

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. Our scheme was devised in reference to the Diffie-Hellman communication protocol model. We divided our MAC protocol into three stages of communication sequences in order to simplify the model and the design of automata machine. In the final result, we combined all stages and represented the protocol as Cryptographic MAC Protocol in the regular language. We have shown that the cryptographic MAC protocol for key exchange protocol can be implemented using finite input-output automata with some small modification of the finite state machine. The proposed protocol would be useful for implementation in a lightweight or a secure smart devices communication in the wireless sensor nodes (WSN) network.

Original languageEnglish
Title of host publicationProcedia Computer Science
PublisherElsevier
Pages263-270
Number of pages8
Volume42
EditionC
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventInternational Symposium on Medical and Rehabilitation Robotics and Instrumentation, MRRI 2013 - Shah Alam, Malaysia
Duration: 2 Dec 20134 Dec 2013

Other

OtherInternational Symposium on Medical and Rehabilitation Robotics and Instrumentation, MRRI 2013
CountryMalaysia
CityShah Alam
Period2/12/134/12/13

Fingerprint

Finite automata
Authentication
Network protocols
Formal languages
Communication
Sensor nodes

Keywords

  • Asymmetric
  • Cellular automata
  • Cryptography
  • Diffie-Hellman
  • Encryption
  • Finite state machine
  • Formal methods
  • Hashing
  • Input-output automata
  • Lightweight
  • MAC
  • Message authentication codes
  • Privacy
  • Security
  • Security protocol
  • STP
  • Symmetric
  • Timed automata
  • Trust

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Isa, M. A. M., Ahmad, M. M., Sani, N. F. M., Hashim, H., & Mahmod, R. (2014). Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine. In Procedia Computer Science (C ed., Vol. 42, pp. 263-270). Elsevier. https://doi.org/10.1016/j.procs.2014.11.061

Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine. / Isa, Mohd Anuar Mat; Ahmad, Miza Mumtaz; Sani, Nor Fazlida Mohd; Hashim, Habibah; Mahmod, Ramlan.

Procedia Computer Science. Vol. 42 C. ed. Elsevier, 2014. p. 263-270.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Isa, MAM, Ahmad, MM, Sani, NFM, Hashim, H & Mahmod, R 2014, Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine. in Procedia Computer Science. C edn, vol. 42, Elsevier, pp. 263-270, International Symposium on Medical and Rehabilitation Robotics and Instrumentation, MRRI 2013, Shah Alam, Malaysia, 2/12/13. https://doi.org/10.1016/j.procs.2014.11.061
Isa MAM, Ahmad MM, Sani NFM, Hashim H, Mahmod R. Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine. In Procedia Computer Science. C ed. Vol. 42. Elsevier. 2014. p. 263-270 https://doi.org/10.1016/j.procs.2014.11.061
Isa, Mohd Anuar Mat ; Ahmad, Miza Mumtaz ; Sani, Nor Fazlida Mohd ; Hashim, Habibah ; Mahmod, Ramlan. / Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine. Procedia Computer Science. Vol. 42 C. ed. Elsevier, 2014. pp. 263-270
@inproceedings{3f34f39a5f304037a7e5837696505865,
title = "Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine",
abstract = "In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. Our scheme was devised in reference to the Diffie-Hellman communication protocol model. We divided our MAC protocol into three stages of communication sequences in order to simplify the model and the design of automata machine. In the final result, we combined all stages and represented the protocol as Cryptographic MAC Protocol in the regular language. We have shown that the cryptographic MAC protocol for key exchange protocol can be implemented using finite input-output automata with some small modification of the finite state machine. The proposed protocol would be useful for implementation in a lightweight or a secure smart devices communication in the wireless sensor nodes (WSN) network.",
keywords = "Asymmetric, Cellular automata, Cryptography, Diffie-Hellman, Encryption, Finite state machine, Formal methods, Hashing, Input-output automata, Lightweight, MAC, Message authentication codes, Privacy, Security, Security protocol, STP, Symmetric, Timed automata, Trust",
author = "Isa, {Mohd Anuar Mat} and Ahmad, {Miza Mumtaz} and Sani, {Nor Fazlida Mohd} and Habibah Hashim and Ramlan Mahmod",
year = "2014",
doi = "10.1016/j.procs.2014.11.061",
language = "English",
volume = "42",
pages = "263--270",
booktitle = "Procedia Computer Science",
publisher = "Elsevier",
edition = "C",

}

TY - GEN

T1 - Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine

AU - Isa, Mohd Anuar Mat

AU - Ahmad, Miza Mumtaz

AU - Sani, Nor Fazlida Mohd

AU - Hashim, Habibah

AU - Mahmod, Ramlan

PY - 2014

Y1 - 2014

N2 - In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. Our scheme was devised in reference to the Diffie-Hellman communication protocol model. We divided our MAC protocol into three stages of communication sequences in order to simplify the model and the design of automata machine. In the final result, we combined all stages and represented the protocol as Cryptographic MAC Protocol in the regular language. We have shown that the cryptographic MAC protocol for key exchange protocol can be implemented using finite input-output automata with some small modification of the finite state machine. The proposed protocol would be useful for implementation in a lightweight or a secure smart devices communication in the wireless sensor nodes (WSN) network.

AB - In this work, we explore the authentication and verification of key exchange protocol using Message Authentication Code (MAC). We propose a new MAC scheme model using input-output automata to protect the integrity of the secret key in the key exchange protocol. Our scheme was devised in reference to the Diffie-Hellman communication protocol model. We divided our MAC protocol into three stages of communication sequences in order to simplify the model and the design of automata machine. In the final result, we combined all stages and represented the protocol as Cryptographic MAC Protocol in the regular language. We have shown that the cryptographic MAC protocol for key exchange protocol can be implemented using finite input-output automata with some small modification of the finite state machine. The proposed protocol would be useful for implementation in a lightweight or a secure smart devices communication in the wireless sensor nodes (WSN) network.

KW - Asymmetric

KW - Cellular automata

KW - Cryptography

KW - Diffie-Hellman

KW - Encryption

KW - Finite state machine

KW - Formal methods

KW - Hashing

KW - Input-output automata

KW - Lightweight

KW - MAC

KW - Message authentication codes

KW - Privacy

KW - Security

KW - Security protocol

KW - STP

KW - Symmetric

KW - Timed automata

KW - Trust

UR - http://www.scopus.com/inward/record.url?scp=84925600883&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84925600883&partnerID=8YFLogxK

U2 - 10.1016/j.procs.2014.11.061

DO - 10.1016/j.procs.2014.11.061

M3 - Conference contribution

VL - 42

SP - 263

EP - 270

BT - Procedia Computer Science

PB - Elsevier

ER -