Security analysis of KEA authenticated key exchange protocol

被引:0
|
作者
Lauter, Kristin
Mityagin, Anton
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] Univ Calif San Diego, Dept Comp Sci, La Jolla, CA 92037 USA
来源
PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS | 2006年 / 3958卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
KEA is a Diffie-Hellman based key-exchange protocol developed by NSA which provides mutual authentication for the parties. It became publicly available in 1998 and since then it was neither attacked nor proved to be secure. We analyze the security of KEA and find that the original protocol is susceptible to a class of attacks. On the positive side, we present a simple modification of the protocol which makes KEA secure. We prove that the modified protocol, called KEA+, satisfies the strongest security requirements for authenticated key-exchange and that it retains some security even if a secret key of a party is leaked. Our security proof is in the random oracle model and uses the Gap Diffie-Hellman assumption. Finally, we show how to add a key confirmation feature to KEA+ (we call the version with key confirmation KEA+C) and discuss the security properties of KEA+C.
引用
收藏
页码:378 / 394
页数:17
相关论文
共 50 条
  • [31] Authenticated key exchange protocol security of cloud services management using machine learning
    Agrawal, Vani
    Dubey, Nilesh
    Singh, Virendra
    Singla, Nepali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1381 - 1391
  • [32] Analysis and improvement of a password-based authenticated key exchange protocol
    Shu, Jian
    Xu, Chun-Xiang
    Tongxin Xuebao/Journal on Communications, 2010, 31 (03): : 51 - 56
  • [33] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Raylin Tso
    The Journal of Supercomputing, 2013, 66 : 863 - 874
  • [34] Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 863 - 874
  • [35] Tighter Security for Generic Authenticated Key Exchange in the QROM
    Pan, Jiaxin
    Wagner, Benedikt
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT IV, 2023, 14441 : 401 - 433
  • [36] Relations among Security Models for Authenticated Key Exchange
    Kwon, Jeong Ok
    Jeong, Ik Rae
    ETRI JOURNAL, 2014, 36 (05) : 856 - 864
  • [37] Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
    Hwang, Min-Shiang
    Li, Chun-Ta
    Chu, Yen-Ping
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 227 - 234
  • [38] Security analysis and enhancements of a three-party authenticated key agreement protocol
    Wang, Zhiheng
    Huo, Zhanqiang
    Shi, Wenbo
    ACTA SCIENTIARUM-TECHNOLOGY, 2015, 37 (03) : 329 - 336
  • [39] Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange
    Nam, Junghyun
    Paik, Juryon
    Won, Dongho
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 865 - 868
  • [40] Security Analysis of Authenticated key Agreement Protocol using Extended SVO Logic
    Liu, Zhimeng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 421 - 424