A Secure and Efficient Authenticated Diffie-Hellman Protocol

被引:0
|
作者
Sarr, Augustin P. [1 ,2 ]
Elbaz-Vincent, Philippe [2 ]
Bajard, Jean-Claude [3 ]
机构
[1] Netheos R&D, Montpellier, France
[2] Univ Grenoble 1, CNRS, Inst Fourier, F-38041 Grenoble, France
[3] Univ Paris 06, CNRS, LIP6, F-75252 Paris 05, France
关键词
security model; (H)MQV; vulnerability; security reduction;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary analysis of these schemes; on the basis of this analysis we show how impersonation and man in the middle attacks can be mounted against HMQV, when some session specific information leakages happen. We define the Full Exponential Challenge Response (FXRC) and Full Dual Exponential Challenge Response (FDCR) signature schemes; using these schemes we propose the Fully Hashed MQV protocol, which preserves the performance and security attributes of the (H)MQV protocols and resists the attacks we present.
引用
收藏
页码:83 / +
页数:3
相关论文
共 50 条
  • [1] Provably secure authenticated group Diffie-Hellman key exchange
    Bresson, Emmanuel
    Chevassut, Olivier
    Pointcheval, David
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)
  • [2] A Fully Authenticated Diffie-Hellman Protocol and Its Application in WSNs
    Sun, Fajun
    He, Selena
    Zhang, Xiaotong
    Zhang, Jun
    Li, Qingan
    He, Yanxiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1986 - 1999
  • [3] Secure and Efficient Tree-based Group Diffie-Hellman Protocol
    Hong, Sunghyuck
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (02): : 178 - 194
  • [4] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171
  • [5] Authenticated Diffie-Hellman Key Agreement Protocol with Forward Secrecy
    ZHANG Chuanrong1
    2. State Key Laboratory of Information Security/Graduate University of Chinese Academy of Science
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 641 - 644
  • [6] Diffie-Hellman process and its use in secure and authenticated VC networks
    Panagiotopoulos, Ilias
    Dimitrakopoulos, George
    [J]. IET INTELLIGENT TRANSPORT SYSTEMS, 2018, 12 (09) : 1082 - 1087
  • [7] An Alternative Diffie-Hellman Protocol
    Jarpe, Eric
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 10
  • [8] A Quantum Diffie-Hellman Protocol
    Subramaniam, Pranav
    Parakh, Abhishek
    [J]. 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 523 - 524
  • [9] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [10] Provably secure password-authenticated key exchange using Diffie-Hellman
    Boyko, V
    MacKenzie, P
    Patel, S
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 156 - 171