2010
DOI: 10.1007/978-3-642-16441-5_6
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Authenticated Diffie–Hellman Protocol

Abstract: Abstract. The Exponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR) signature schemes are the building blocks of the HMQV protocol. We propose a complementary analysis of these schemes; on the basis of this analysis we show how impersonation and man in the middle attacks can be mounted against the HMQV protocol when some session specific information leakages happen. We define the Full Exponential Challenge Response (FXRC) and Full Dual Exponential Challenge Response (FDCR) signatur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 40 publications
(27 citation statements)
references
References 18 publications
0
27
0
Order By: Relevance
“…In many DH protocols, (C, FH, H)MQV-C [18,33,29,14,15] and NAXOS(+,-C) [20,24,17], for instance, the computation of the intermediate results is more costly than that of the ephemeral public key. For these protocols, implementations efficiency is significantly enhanced when the ephemeral keys are computed on the device, while the intermediate results, which require expensive on-line computations and session keys are computed on the host machine.…”
Section: Stronger Securitymentioning
confidence: 99%
See 4 more Smart Citations
“…In many DH protocols, (C, FH, H)MQV-C [18,33,29,14,15] and NAXOS(+,-C) [20,24,17], for instance, the computation of the intermediate results is more costly than that of the ephemeral public key. For these protocols, implementations efficiency is significantly enhanced when the ephemeral keys are computed on the device, while the intermediate results, which require expensive on-line computations and session keys are computed on the host machine.…”
Section: Stronger Securitymentioning
confidence: 99%
“…The eCK model does not consider leakages on intermediate results; and this makes many of the eCK secure protocols insecure in the seCK model. For instance, in the CMQV protocol (shown eCKsecure), an attacker which learns an ephemeral secret exponent in a session, can indefinitely impersonate the session owner; the same holds for the (H)MQV(-C) protocols [29,30]. It is not difficult to see that NAXOS cannot meet the seCK security definition.…”
Section: Proposition 1 Any Seck-secure Protocol Is Also An Eck-securmentioning
confidence: 99%
See 3 more Smart Citations