posted on 2009-12-16, 11:17authored byRaphael C.-W. Phan
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange into the digital signature algorithm (DSA). It was claimed that the protocols provide known-key security and unknown key-share resilience, while the most advanced variant also provides key-replay resilience. However, we show in this paper that the protocols do not provide forward secrecy and key freshness which are two of the standard security attributes that key exchange protocols should have. We also fix the protocols such that they provide these security attributes.
History
School
Mechanical, Electrical and Manufacturing Engineering
Citation
PHAN, R.C.-W., 2005. Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Communications Letters, 9(6), pp. 570 - 572