fixing.pdf (137.63 kB)
Download fileFixing the integrated Diffie-Hellman-DSA key exchange protocol
journal contribution
posted on 2009-12-16, 11:17 authored by Raphael C.-W. PhanRecently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange into the digital signature algorithm (DSA). It was claimed that the protocols provide known-key security and unknown key-share resilience, while the most advanced variant also provides key-replay resilience. However, we show in this paper that the protocols do not provide forward secrecy and key freshness which are two of the standard security attributes that key exchange protocols should have. We also fix the protocols such that they provide these security attributes.
History
School
- Mechanical, Electrical and Manufacturing Engineering
Citation
PHAN, R.C.-W., 2005. Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Communications Letters, 9(6), pp. 570 - 572Publisher
© IEEEVersion
- VoR (Version of Record)
Publication date
2005Notes
This journal article is published in IEEE Communications Letters [© IEEE]. It is also available at: http://ieeexplore.ieee.org/ Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.ISSN
1089-7798Language
- en