Logical Protocol Analysis for Authenticated Diffie-Hellman∗
نویسندگان
چکیده
Diffie-Hellman protocols for authenticated key agreement construct a shared secret with a peer using a minimum of communication and using limited cryptographic operations. However, their analysis has been challenging in computational models and especially in symbolic models. In this paper, we develop a logical framework for protocol analysis based on strand space ideas. We show that it identifies exact assumptions on the behavior of a certifying authority. These assumptions prevent attacks on two authenticated DH protocols, the Unified Model and Menezes-Qu-Vanstone (MQV). Verification within our framework implies that the adversary has no strategy that works uniformly, independent of the choice of the cyclic group in which the protocol operates. Computational soundness would assert that an adversary strategy successful in groups satisfying the Decisional Diffie-Hellman assumption would also furnish a uniform, group-independent strategy. Computational soundness awaits further investigation.
منابع مشابه
Identity Based Authenticated Key Agreement from Pairings
We present a new identity based authenticated key agreement protocol from pairings satisfying the required security attributes. The security of our protocol is based on the bilinear Diffie-Hellman assumption.
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملAuthenticated Diffie–Hellman key agreement protocol using a single cryptographic assumption
In modern communication systems, a popular way of providing authentication in an authenticated Diffie–Hellman key agreement protocol is to sign the result of a one-way hash function (such as MD5) of a Diffie–Hellman public key. The security of such a protocol is based on the weakest of all the cryptographic assumptions of the algorithms involved: Diffie–Hellman key distribution, digital signatu...
متن کاملSecurity Analysis of the PACE Key-Agreement Protocol
We analyze the Password Authenticated Connection Establishment (PACE) protocol for authenticated key agreement, recently proposed by the German Federal Office for Information Security (BSI) for the deployment in machine readable travel documents. We show that the PACE protocol is secure in the real-or-random sense of Abdalla, Fouque and Pointcheval, under a number-theoretic assumption related t...
متن کاملStrongly Secure Authenticated Key Exchange from Ideal Lattices
In this paper, we propose an efficient and practical authenticated key exchange (AKE) protocol from ideal lattices, which is well-designed and has some similarity to the HMQV protocol. Using the hardness of the graded discrete logarithm (GDL) problem and graded decisional Diffie-Hellman (GCDH) problem, the proposed protocol is provably secure in the extended Canetti-Krawczyk model.
متن کامل