Authentication and Key Agreement (AKA)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
22-09-2008, 09:14 AM

AKA stands for the Authentication and Key Agreement security protocol. It is a mechanism which performs authentication and session key distribution in Universal Mobile Telecommunications System (UMTS) networks. AKA is a challenge-response based mechanism that uses symmetric cryptography. AKA is typically run in a UMTS IM Services Identity Module (ISIM), which resides on a smart card like device that also provides tamper resistant storage of shared secrets.
Exponential key exchange
The first publicly knownbpublic-key agreement protocol that meets the above criteria was the Diffie-Hellman exponential key exchange, in which two people jointly exponentiate a generator with random numbers, in such a way that an eavesdropper has no way of guessing what the key is.However, exponential key exchange in and of itself does not specify any prior agreement or subsequent authentication between the participants. It has thus been described as an anonymous key agreement protocol.
Anonymous key exchange, like Diffie-Hellman, does not provide authentication of the parties, and is thus vulnerable to Man-in-the-middle attacks.A wide variety of cryptographic authentication schemes and protocols have been developed to provide authenticated key agreement to prevent man-in-the-middle and related attacks. These methods generally mathematically bind the agreed key to other agreed-upon data, such as:
Public/private key pairs , Shared secret keys , Passwords ..
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
sravanthi goud
Active In SP

Posts: 1
Joined: Jan 2011
30-01-2011, 04:11 PM

plz send full repor[/size][/color]t of AKA seminar and presentation topicSmile
Active In SP

Posts: 1
Joined: Aug 2010
01-02-2011, 12:13 AM

hai plz send me.........................................................................
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
01-02-2011, 11:44 AM

please go through the following thread for more details on Authentication and Key Agreement (AKA).

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: authentection key, key agreement ppt, authentication key distribution key agreement ppt, authentication and key agreement aka, seminar ppt on new aka protocol of 3g based on diffie hellman, anonymous key agreement ppt, seminar topic authentication and key agreement aka,
Popular Searches: project for key controlled forklift, mqv menezes qu vanstone key agreement code, key controlled forklift, aka authentication shared key ppt, recognition agreement coop, ppt authentication key agreement protocol, jaas pluggable authentication,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,188 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Controlled Data Hiding Technique for Color Image Authentication in Frequency pdf seminar projects maker 0 468 26-09-2013, 03:02 PM
Last Post: seminar projects maker
  Biometrics Based Authentication Systems (Download Full Abstract And Report) computer science crazy 13 8,282 24-08-2013, 04:38 PM
Last Post: Guest
  Capturing Hand or Wrist Vein Images for Biometric Authentication Using Low-Cost study tips 0 320 20-08-2013, 04:30 PM
Last Post: study tips
  Improved Feature Processing for Iris Biometric Authentication System pdf study tips 0 330 03-08-2013, 02:21 PM
Last Post: study tips
  Design and Implementation of Improved Authentication System for Android pdf study tips 0 400 12-07-2013, 03:14 PM
Last Post: study tips
  Secure Multi-hop Network Programming With Multiple One-way Key Chains pdf study tips 0 256 26-06-2013, 12:33 PM
Last Post: study tips
  Efficient Key Agreement for Large and Dynamic Multicast Groups pdf study tips 0 706 20-06-2013, 12:21 PM
Last Post: study tips
  ppt on Biometric Authentication study tips 0 246 17-06-2013, 02:59 PM
Last Post: study tips
  REPORT ON AUTHENTICATION study tips 0 264 12-06-2013, 04:51 PM
Last Post: study tips