×

Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. (English) Zbl 1272.94082

Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 79-94 (2005).
Summary: Authenticated key exchange protocols have been developed to establish secure channels on the internet. In this paper, we consider the following attacks against an authenticated key exchange using shared secret: eavesdropping, DoS attack, replay attack, and impersonation. Besides prevention from all these attacks, efficiency is also important. In this paper, we propose a three-party authenticated key exchange protocol based on the Diffie-Hellman key exchange with one-time ID, which is a user’s extraordinary identity used only once [H. Krawczyk, The IKE-SIGMA protocol. Internet draft (2001), http://www.ee.technion.ac.il/~hugo/draft-krawczyk-ipsec-ike-sigma-00.txt]. Moreover, we analyze our proposal by SVO logic, which is one of formal methods to analyze cryptographic protocols [P. Syverson and P. C. van Oorschot, A unified cryptographic protocol logic. NRL CHAOS Report 5540-227 (1996); P. Syverson and I. Cervesato, Lect. Notes Comput. Sci. 2171, 63–136 (2001; Zbl 1007.68510)], and show what assumptions are needed.
For the entire collection see [Zbl 1272.68016].

MSC:

94A62 Authentication, digital signatures and secret sharing
68M12 Network protocols

Citations:

Zbl 1007.68510