An algebraic approach to the verification of a class of Diffie-Hellman protocols

被引:0
|
作者
Delicata, Rob [1 ]
Schneider, Steve [1 ]
机构
[1] Univ Surrey, Dept Comp, Surrey GU2 7XH, England
关键词
protocol verification; Diffie-Hellman;
D O I
10.1007/s10207-007-0013-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a framework for reasoning about secrecy in a class of Diffie-Hellman protocols. The technique, which shares a conceptual origin with the idea of a rank function, uses the notion of a message-template to determine whether a given value is generable by an intruder in a protocol model. Traditionally, the rich algebraic structure of Diffie-Hellman messages has made it difficult to reason about such protocols using formal, rather than complexity-theoretic, techniques. We describe the approach in the context of the MTI protocols, and derive conditions under which each protocol in the suite can be considered secure.(1).
引用
收藏
页码:183 / 196
页数:14
相关论文
共 50 条
  • [1] An algebraic approach to the verification of a class of Diffie-Hellman protocols
    Rob Delicata
    Steve Schneider
    [J]. International Journal of Information Security, 2007, 6 : 183 - 196
  • [2] Decidability for Lightweight Diffie-Hellman Protocols
    Dougherty, Daniel J.
    Guttman, Joshua D.
    [J]. 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 217 - 231
  • [3] An Algebraic Framework for Diffie-Hellman Assumptions
    Escala, Alex
    Herold, Gottfried
    Kiltz, Eike
    Rafols, Carla
    Villar, Jorge
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 129 - 147
  • [4] An Algebraic Framework for Diffie-Hellman Assumptions
    Escala, Alex
    Herold, Gottfried
    Kiltz, Eike
    Rafols, Carla
    Villar, Jorge
    [J]. JOURNAL OF CRYPTOLOGY, 2017, 30 (01) : 242 - 288
  • [5] Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
    Maurer, U
    Wolf, S
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 327 - 327
  • [6] Algebraic generalization of Diffie-Hellman key exchange
    Partala, Juha
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2018, 12 (01) : 1 - 21
  • [7] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [8] Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols
    Ustaoglu, Berkant
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 183 - 197
  • [9] Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
    Kuesters, Ralf
    Truderung, Tomasz
    [J]. PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 157 - 171
  • [10] Diffie-Hellman to the rescue
    Tate, A
    [J]. DR DOBBS JOURNAL, 2001, 26 (06): : 12 - 12