Hoang Van Viet, N. H. Minh, Bui The Truyen, Nguyen Thi Nga
{"title":"Improving on the integrated Diffie-Hellman-GOST.R94 key agreement protocols","authors":"Hoang Van Viet, N. H. Minh, Bui The Truyen, Nguyen Thi Nga","doi":"10.1109/WICT.2013.7113119","DOIUrl":null,"url":null,"abstract":"Recently, there are some works that developed key exchange protocol by integrating Diffie Hellman key exchange protocol (DHKE) into Digital Signature Algorithm (DSA). It was claimed that the protocols provide known key authentication, forward secrecy, known-key security, unknown key-share attack, key relay attack and key freshness. In this Paper, we show that the protocols do not provide session-state reveal attribute which is one of the standard security attributes that key exchange protocols should have. We also present two new protocols: NDH-GOST1 and NDH-GOST2 which ensure the session-state reveal property.","PeriodicalId":235292,"journal":{"name":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Third World Congress on Information and Communication Technologies (WICT 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2013.7113119","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Recently, there are some works that developed key exchange protocol by integrating Diffie Hellman key exchange protocol (DHKE) into Digital Signature Algorithm (DSA). It was claimed that the protocols provide known key authentication, forward secrecy, known-key security, unknown key-share attack, key relay attack and key freshness. In this Paper, we show that the protocols do not provide session-state reveal attribute which is one of the standard security attributes that key exchange protocols should have. We also present two new protocols: NDH-GOST1 and NDH-GOST2 which ensure the session-state reveal property.