Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols

被引:0
|
作者
Chatterjee, Sanjit [1 ]
Menezes, Alfred [1 ]
Ustaoglu, Berkant [2 ]
机构
[1] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[2] NTT Informat Sharing Platform Labs, Tokyo, Japan
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unified model (UM) is a family of key agreement protocols that has been standardized by ANSI and NisT. The NIST standard explicitly permits the reuse of a static key pair among the one-pass and three-pass UM protocols. However, a recent study demonstrated that such reuse can lead to security vulnerabilities. In this paper we revisit the security of the one- and three-pass UM protocols when static key pairs are reused. We propose a shared security model that incorporates the individual security attributes of the two protocols. We then show, provided appropriate measures are taken, that the protocols are secure even when static key pairs are reused.
引用
收藏
页码:49 / +
页数:3
相关论文
共 22 条
  • [1] A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
    Lim, Meng-Hui
    Yeoh, Chee-Min
    Lee, Sanggon
    Lim, Hyotaek
    Lee, Hoonjae
    [J]. NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 170 - +
  • [2] AN EFFICIENT AND SECURE THREE-PASS AUTHENTICATED KEY AGREEMENT ELLIPTIC CURVE BASED PROTOCOL
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1273 - 1284
  • [3] Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
    Mohammad, Zeyad
    Hsu, Chien-Lung
    Chen, Yaw-Chung
    Lo, Chi-Chun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (02): : 247 - 250
  • [4] Security Analysis Combination Secret Sharing Protocol and Three-Pass Protocol
    Nababan, Darsono
    Rahim, Robbi
    [J]. 1ST INTERNATIONAL CONFERENCE ON ADVANCE AND SCIENTIFIC INNOVATION, 2019, 1175
  • [5] Questioning the Security of Three Recent Authentication and Key Agreement Protocols
    Rahmani, Amir Masoud
    Mohammadi, Mokhtar
    Rashidi, Shima
    Lansky, Jan
    Mildeova, Stanislava
    Safkhani, Masoumeh
    Kumari, Saru
    Hosseinzadeh, Mehdi
    [J]. IEEE ACCESS, 2021, 9 : 98204 - 98217
  • [6] Key agreement protocols and their security analysis (Extended abstract)
    Blake-Wilson, S
    Johnson, D
    Menezes, A
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
  • [7] Security analysis and applications of standard key agreement protocols
    Oh, S
    Kwak, J
    Lee, S
    Won, D
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2003, PT 2, PROCEEDINGS, 2003, 2668 : 191 - 200
  • [8] Analysis on Security Proof of Two Key Agreement Protocols
    Zhou, Huihua
    Zheng, Minghui
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 531 - +
  • [9] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [10] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58