Security analysis of KEA authenticated key exchange protocol

被引:0
|
作者
Lauter, Kristin
Mityagin, Anton
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] Univ Calif San Diego, Dept Comp Sci, La Jolla, CA 92037 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
KEA is a Diffie-Hellman based key-exchange protocol developed by NSA which provides mutual authentication for the parties. It became publicly available in 1998 and since then it was neither attacked nor proved to be secure. We analyze the security of KEA and find that the original protocol is susceptible to a class of attacks. On the positive side, we present a simple modification of the protocol which makes KEA secure. We prove that the modified protocol, called KEA+, satisfies the strongest security requirements for authenticated key-exchange and that it retains some security even if a secret key of a party is leaked. Our security proof is in the random oracle model and uses the Gap Diffie-Hellman assumption. Finally, we show how to add a key confirmation feature to KEA+ (we call the version with key confirmation KEA+C) and discuss the security properties of KEA+C.
引用
收藏
页码:378 / 394
页数:17
相关论文
共 50 条
  • [1] Security analysis of a password authenticated key exchange protocol
    Bao, F
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 208 - 217
  • [2] Universally composable security authenticated key exchange protocol
    Zhang, Zinan, 1600, Science Press (41):
  • [3] Password Authenticated Key Exchange Protocol with Stronger Security
    Ding Xiao-fei
    Ma Chuan-gui
    Cheng Qing-feng
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 678 - 681
  • [4] Analysis and Improvement of an Authenticated Key Exchange Protocol
    Pan, Jiaxin
    Wang, Libin
    Ma, Changshe
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 417 - 431
  • [5] Analysis and improvement of an authenticated multiple key exchange protocol
    Cheng, Qingfeng
    Ma, Chuangui
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 187 - 190
  • [6] Design and Logical Analysis of Authenticated Key Exchange Protocol
    Chen, Li
    Jiang, Zhijun
    Zhu, Yuefei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4707 - +
  • [7] Security analysis of authenticated key exchange protocol based on the q-th root problem
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 231 - 233
  • [8] Stronger security of authenticated key exchange
    LaMacchia, Brian
    Lauter, Kristin
    Mityagin, Anton
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 1 - +
  • [9] Authenticated key exchange for wireless security
    Imai, H
    Shin, S
    Kobara, K
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1180 - 1186
  • [10] Secure authenticated key exchange protocol
    Kim, WH
    Kim, HS
    Lee, SW
    Yoo, KY
    COMPUTERS AND THEIR APPLICATIONS, 2003, : 5 - 8