Abstract
Diffie-Hellman (DH) key exchange is a well known method for secure exchange of cryptographic keys and has been widely used in popular Internet protocols, such as IPsec, TLS, and SSH. To enable authenticated key establishment, the DH protocol has been integrated with the digital signature algorithm (DSA). In this paper, we analyze three variants of the integrated DH-DSA protocol. We study the protocol variants with respect to known types of attacks and security features. In particular, the focus is on the properties of forward secrecy, known-key security, and replay attack resilience.
Original language | English |
---|---|
Number of pages | 6 |
Publication status | Accepted/In press - 30 Apr 2017 |
Event | IEICE Information and Communication Technology Forum - Poznan, Poland Duration: 4 Jul 2017 → 6 Jul 2017 http://www.ictf2017.ieice-europe.org/ |
Conference
Conference | IEICE Information and Communication Technology Forum |
---|---|
Abbreviated title | ICTF |
Country/Territory | Poland |
City | Poznan |
Period | 4/07/17 → 6/07/17 |
Internet address |
Keywords
- Diffie-Hellman
- Digital Certificate Algorithm
- Key Agreement Protocol
- Network Security