Improving on the integrated Diffie-Hellman-GOST.R94 key agreement protocols

Hoang Van Viet, N. H. Minh, Bui The Truyen, Nguyen Thi Nga
{"title":"Improving on the integrated Diffie-Hellman-GOST.R94 key agreement protocols","authors":"Hoang Van Viet, N. H. Minh, Bui The Truyen, Nguyen Thi Nga","doi":"10.1109/WICT.2013.7113119","DOIUrl":null,"url":null,"abstract":"Recently, there are some works that developed key exchange protocol by integrating Diffie Hellman key exchange protocol (DHKE) into Digital Signature Algorithm (DSA). It was claimed that the protocols provide known key authentication, forward secrecy, known-key security, unknown key-share attack, key relay attack and key freshness. In this Paper, we show that the protocols do not provide session-state reveal attribute which is one of the standard security attributes that key exchange protocols should have. We also present two new protocols: NDH-GOST1 and NDH-GOST2 which ensure the session-state reveal property.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2013.7113119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Recently, there are some works that developed key exchange protocol by integrating Diffie Hellman key exchange protocol (DHKE) into Digital Signature Algorithm (DSA). It was claimed that the protocols provide known key authentication, forward secrecy, known-key security, unknown key-share attack, key relay attack and key freshness. In this Paper, we show that the protocols do not provide session-state reveal attribute which is one of the standard security attributes that key exchange protocols should have. We also present two new protocols: NDH-GOST1 and NDH-GOST2 which ensure the session-state reveal property.
对集成Diffie-Hellman-GOST的改进。R94密钥协议
近年来,一些学者将Diffie Hellman密钥交换协议(DHKE)集成到数字签名算法(DSA)中,开发了密钥交换协议。据称,这些协议提供了已知密钥认证、前向保密、已知密钥安全、未知密钥共享攻击、密钥中继攻击和密钥新鲜度。在本文中,我们证明了这些协议没有提供会话状态显示属性,而会话状态显示属性是密钥交换协议应该具有的标准安全属性之一。我们还提出了两个新的协议:NDH-GOST1和NDH-GOST2,它们保证了会话状态的显示特性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信