Entity authentication and key agreement (AK) is a critical cryptographic problem in wireless communications, where mutual entity authentication plays a crucial role in building a secure and authentic connection. The document proposes an effective key authentication agreement system and increases the speed of the safer authentication process. The signal effort is minimized by creating the validity of the mobile device reception agent, which indicates whether the foreign agent`s certificate is valid or not. An effective possibility for the implementation of an expanded version of the protocol is proposed. The NTRU algorithm is used to decrypt and decipher messages. The NTRU algorithm is one of the effective asymmetrical cryptographic algorithms based on key grids. NTRU has proven to be the fastest and safest encryption algorithm. AES is used for symmetrical key encryption. The result shows that the proposed method is effective.

This technique is called a key agreement. The most popular key protocols are the Diffie-Hellman protocol, which can be simplified on the following image (stolen in Wikipedia): In fact, it`s a little more complicated. If the rsA key is used, precise method (exchange or agreement is negotiated during TLS Handshake). A key memorandum of understanding is usually called after two parties have been authenticated. The common key agreement allows parties to communicate safely via unreliable communication networks. However – why do you need the configuration in the model – if the encryption/agreement key is defund by the selected asymmetric algorithm? In cryptography, a key memorandum of understanding is a protocol in which two or more parties can agree on a key so that both influence the outcome. If this is done correctly, it prevents undesirable third parties from imposing an important decision on the appropriate parties. Protocols that are useful in practice also do not reveal to a listening party the key that has been agreed upon. Key mous that is verified by the password requires the separate implementation of a password (which may be smaller than a key) in a way that is both private and integrity.

These are designed to withstand man-in-the-middle and other active attacks on the password and established keys. For example, DH-EKE, SPEKE and SRP are Diffie-Hellman password authentication variants. Commonly used key agreement protocols include diffie-hellman or protocols based on the RSA or ECC. The first public public key memorandum of understanding [1] that meets the above criteria was the Diffie-Hellman key exchange, in which two parties jointly exposed a generator to random numbers, so that an earpiece cannot easily determine what the resulting value is used to create a common key. A large number of cryptographic authentication schemes and protocols have been designed to provide authenticated key agreements to prevent man-in-the-middle and related attacks. These methods generally mathematically link the agreed key to other agreed data, for example.B.: yes.