Security Analysis of Improved EDHOC Protocol

نویسندگان

چکیده

Ephemeral Diffie-Hellman Over COSE (EDHOC) aims at being a very compact and lightweight authenticated key exchange with ephemeral keys. It is expected to provide mutual authentication, forward secrecy, identity protection, 128-bit security level. A formal analysis has already been proposed SECRYPT ’21, on former version, leading some improvements, in the ongoing evaluation process by IETF. Unfortunately, while can detect vulnerabilities protocol, it cannot evaluate actual In this paper, we study protocol as appeared version 15. Without complete breaks, anyway exhibit attacks $$2^{64}$$ operations, which contradict We thereafter propose of them no additional cost, achieve for all properties (i.e. privacy, identity-protection).

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QAODV: Improved Security Routing Protocol of AODV

Network control system (NCS) has higher requirements on QoS index of the network, but MANET can hardly meet the demands of control systems because of its own characteristics. The paper improves AODV and proposes AODV routing protocol QAODV with certain QoS security in combination with NCS and MANET, and expounds routing detection, routing register and routing maintenance. Simulation results sho...

متن کامل

An Improved E-Mail Security Protocol

Current e-mail security systems base their security on the secrecy of the long-term private key. If this private key is ever compromised, an attacker can decrypt any messages— past, present, or future—encrypted with the corresponding public key. The system described in this paper uses short term private-key/public-key key pairs to reduce the magnitude of this vulnerability.

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Formal Security Protocol Analysis

Not all of the protocol security flaws described at the SSR2014 conference were discovered using these new automated techniques. Several significant findings were the result of more traditional methods. These findings included flaws in standardized and deployed protocols, as well as important innovations to improve and extend the capabilities of long-used cryptographic techniques. Based on thes...

متن کامل

Security Protocol Analysis

This note describes previously completed and ongoing research in the MRG in the area of security protocol analysis.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-30122-3_1