Results 1 - 10
of
211
ON REUSING EPHEMERAL KEYS IN DIFFIE-HELLMAN KEY AGREEMENT PROTOCOLS
"... Abstract. A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note we highlight the danger of reusing ephemeral keys if domain parameters are not appropria ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Abstract. A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note we highlight the danger of reusing ephemeral keys if domain parameters
Authenticated Diffie-Hellman Key Agreement Protocols
, 1998
"... This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO/IEC, a ..."
Abstract
-
Cited by 83 (1 self)
- Add to MetaCart
This paper surveys recent work on the design and analysis of key agreement protocols that are based on the intractability of the Diffie-Hellman problem. The focus is on protocols that have been standardized, or are in the process of being standardized, by organizations such as ANSI, IEEE, ISO
Security Issues in the Diffie-Hellman Key Agreement Protocol
- IEEE Trans. on Information Theory
, 2000
"... Diffie-Hellman key agreement protocol [27] implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, haven't been taken into account by protocol designers. In this paper we attempt to provide a link between theoretical research and r ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
Diffie-Hellman key agreement protocol [27] implementations have been plagued by serious security flaws. The attacks can be very subtle and, more often than not, haven't been taken into account by protocol designers. In this paper we attempt to provide a link between theoretical research
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
, 2009
"... This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings. For the Sakai-Ohgishi-Kasahara (SOK) ID-based key construction, we show that identical to the Diffie-Hellman protocol, the SOK ke ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
key agreement protocol also has three variants, namely ephemeral, semi-static and static versions. Upon this, we build solid relations between authenticated Diffie-Hellman (Auth-DH) protocols and ID-based authenticated key agreement (IB-AK) protocols, whereby we present two substitution rules
Analysis on the Diffie-Hellman Mode
, 2009
"... Abstract ZRTP is a key agreement protocol by Philip Zimmermann, Alan Johnston and Jon Callas, which relies on a Diffie-Hellman exchange to generate SRTP session parameters, providing confidentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure or endpoint ..."
Abstract
- Add to MetaCart
Abstract ZRTP is a key agreement protocol by Philip Zimmermann, Alan Johnston and Jon Callas, which relies on a Diffie-Hellman exchange to generate SRTP session parameters, providing confidentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure
A Quantum Diffie-Hellman Protocol
"... Abstract—In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. I. ..."
Abstract
- Add to MetaCart
Abstract—In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. I.
Decidability for Lightweight Diffie-Hellman Protocols
"... Abstract—Many protocols use Diffie-Hellman key agreement, combined with certified long-term values or digital signatures for authentication. These protocols aim at security goals such as key secrecy, forward secrecy, resistance to key compromise attacks, and various flavors of authentication. Howeve ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Abstract—Many protocols use Diffie-Hellman key agreement, combined with certified long-term values or digital signatures for authentication. These protocols aim at security goals such as key secrecy, forward secrecy, resistance to key compromise attacks, and various flavors of authentication
Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol ⋆
, 2007
"... Abstract. In SAC’05, Strangio proposed protocol ECKE-1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. In this letter, we show that despite the author’s claims protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We al ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Abstract. In SAC’05, Strangio proposed protocol ECKE-1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. In this letter, we show that despite the author’s claims protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We
Exponentiation Speed Up For Diffie-Hellman Key Agreement Protocol
, 2006
"... Abstract — The Diffie-Hellman key agreement protocol is a well known method in which two parties agree on a secret key by mean of public communication. From the computational point of view, the protocol requires, from both paries, to execute two exponentiations in some group, where the secret expone ..."
Abstract
- Add to MetaCart
Abstract — The Diffie-Hellman key agreement protocol is a well known method in which two parties agree on a secret key by mean of public communication. From the computational point of view, the protocol requires, from both paries, to execute two exponentiations in some group, where the secret
The diffie-hellman key-agreement scheme in the strand-space model
- In Proceedings, 16th IEEE Computer Security Foundations Workshop. IEEE CS
, 2003
"... The Diffie-Hellman key exchange scheme is a standard component of cryptographic protocols. In this paper, we propose a way in which protocols that use this computational primitive can be verified using formal methods. In particular, we separate the computational aspects of such an analysis from the ..."
Abstract
-
Cited by 11 (2 self)
- Add to MetaCart
The Diffie-Hellman key exchange scheme is a standard component of cryptographic protocols. In this paper, we propose a way in which protocols that use this computational primitive can be verified using formal methods. In particular, we separate the computational aspects of such an analysis from
Results 1 - 10
of
211