Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols

Research output: Contribution to conferencePaper

Standard

Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols. / Vasilakis, Vasileios; Alohali, Bashar; Moscholios, Ioannis; Logothetis, Michael.

2017. Paper presented at IEICE Information and Communication Technology Forum, Poznan, Poland.

Research output: Contribution to conferencePaper

Harvard

Vasilakis, V, Alohali, B, Moscholios, I & Logothetis, M 2017, 'Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols', Paper presented at IEICE Information and Communication Technology Forum, Poznan, Poland, 4/07/17 - 6/07/17.

APA

Vasilakis, V., Alohali, B., Moscholios, I., & Logothetis, M. (Accepted/In press). Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols. Paper presented at IEICE Information and Communication Technology Forum, Poznan, Poland.

Vancouver

Vasilakis V, Alohali B, Moscholios I, Logothetis M. Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols. 2017. Paper presented at IEICE Information and Communication Technology Forum, Poznan, Poland.

Author

Vasilakis, Vasileios ; Alohali, Bashar ; Moscholios, Ioannis ; Logothetis, Michael. / Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols. Paper presented at IEICE Information and Communication Technology Forum, Poznan, Poland.6 p.

Bibtex - Download

@conference{5ebc869467534cf6b0c52855c387bace,
title = "Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols",
abstract = "Diffie-Hellman (DH) key exchange is a well known method for secure exchange of cryptographic keys and has been widely used in popular Internet protocols, such as IPsec, TLS, and SSH. To enable authenticated key establishment, the DH protocol has been integrated with the digital signature algorithm (DSA). In this paper, we analyze three variants of the integrated DH-DSA protocol. We study the protocol variants with respect to known types of attacks and security features. In particular, the focus is on the properties of forward secrecy, known-key security, and replay attack resilience.",
keywords = "Diffie-Hellman, Digital Certificate Algorithm, Key Agreement Protocol, Network Security",
author = "Vasileios Vasilakis and Bashar Alohali and Ioannis Moscholios and Michael Logothetis",
year = "2017",
month = apr,
day = "30",
language = "English",
note = "IEICE Information and Communication Technology Forum, ICTF ; Conference date: 04-07-2017 Through 06-07-2017",
url = "http://www.ictf2017.ieice-europe.org/",

}

RIS (suitable for import to EndNote) - Download

TY - CONF

T1 - Security Analysis of Integrated Diffie-Hellman Digital Signature Algorithm Protocols

AU - Vasilakis, Vasileios

AU - Alohali, Bashar

AU - Moscholios, Ioannis

AU - Logothetis, Michael

PY - 2017/4/30

Y1 - 2017/4/30

N2 - Diffie-Hellman (DH) key exchange is a well known method for secure exchange of cryptographic keys and has been widely used in popular Internet protocols, such as IPsec, TLS, and SSH. To enable authenticated key establishment, the DH protocol has been integrated with the digital signature algorithm (DSA). In this paper, we analyze three variants of the integrated DH-DSA protocol. We study the protocol variants with respect to known types of attacks and security features. In particular, the focus is on the properties of forward secrecy, known-key security, and replay attack resilience.

AB - Diffie-Hellman (DH) key exchange is a well known method for secure exchange of cryptographic keys and has been widely used in popular Internet protocols, such as IPsec, TLS, and SSH. To enable authenticated key establishment, the DH protocol has been integrated with the digital signature algorithm (DSA). In this paper, we analyze three variants of the integrated DH-DSA protocol. We study the protocol variants with respect to known types of attacks and security features. In particular, the focus is on the properties of forward secrecy, known-key security, and replay attack resilience.

KW - Diffie-Hellman

KW - Digital Certificate Algorithm

KW - Key Agreement Protocol

KW - Network Security

M3 - Paper

T2 - IEICE Information and Communication Technology Forum

Y2 - 4 July 2017 through 6 July 2017

ER -