fixing.pdf (137.63 kB)

Fixing the integrated Diffie-Hellman-DSA key exchange protocol

Download (137.63 kB)
journal contribution
posted on 16.12.2009, 11:17 by Raphael C.-W. Phan
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange into the digital signature algorithm (DSA). It was claimed that the protocols provide known-key security and unknown key-share resilience, while the most advanced variant also provides key-replay resilience. However, we show in this paper that the protocols do not provide forward secrecy and key freshness which are two of the standard security attributes that key exchange protocols should have. We also fix the protocols such that they provide these security attributes.

History

School

  • Mechanical, Electrical and Manufacturing Engineering

Citation

PHAN, R.C.-W., 2005. Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Communications Letters, 9(6), pp. 570 - 572

Publisher

© IEEE

Version

VoR (Version of Record)

Publication date

2005

Notes

This journal article is published in IEEE Communications Letters [© IEEE]. It is also available at: http://ieeexplore.ieee.org/ Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

ISSN

1089-7798

Language

en

Exports

Loughborough Publications

Keywords

Exports