Fixing the integrated Diffie-Hellman-DSA key exchange protocol
journal contributionposted on 2009-12-16, 11:17 authored by Raphael C.-W. Phan
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange into the digital signature algorithm (DSA). It was claimed that the protocols provide known-key security and unknown key-share resilience, while the most advanced variant also provides key-replay resilience. However, we show in this paper that the protocols do not provide forward secrecy and key freshness which are two of the standard security attributes that key exchange protocols should have. We also fix the protocols such that they provide these security attributes.
- Mechanical, Electrical and Manufacturing Engineering
CitationPHAN, R.C.-W., 2005. Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Communications Letters, 9(6), pp. 570 - 572
- VoR (Version of Record)
NotesThis journal article is published in IEEE Communications Letters [© IEEE]. It is also available at: http://ieeexplore.ieee.org/ Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.