A Chronological Review of Key Establishment Models and Protocols
Yap, E. Y. Y., Chin, J. J., and Goh, A.
Corresponding Email: [email protected]
Received date: 15 June 2021
Accepted date: 8 October 2021
Abstract:
This work is a review on existing authenticated key exchange (AKE) security models and protocols mainly based on Diffie-Hellman Key Exchange (DHKE). We provide a discussion on the various security models of AKEs, such as the Bellare Rogaway (BR) model, Canetti Krawczyk
(CK) model and their variants. Then we provide a review covering over ninety protocols in chronological order. The security models' security features and protocol examples that fit in those security models are exhibited.
Keywords: security models; Bellare-Rogaway; Canetti-Krawczyk; authenticated key exchange; protocols; review