Security analysis of KEA authenticated key exchange protocol

被引:0
|
作者
Lauter, Kristin
Mityagin, Anton
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] Univ Calif San Diego, Dept Comp Sci, La Jolla, CA 92037 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
KEA is a Diffie-Hellman based key-exchange protocol developed by NSA which provides mutual authentication for the parties. It became publicly available in 1998 and since then it was neither attacked nor proved to be secure. We analyze the security of KEA and find that the original protocol is susceptible to a class of attacks. On the positive side, we present a simple modification of the protocol which makes KEA secure. We prove that the modified protocol, called KEA+, satisfies the strongest security requirements for authenticated key-exchange and that it retains some security even if a secret key of a party is leaked. Our security proof is in the random oracle model and uses the Gap Diffie-Hellman assumption. Finally, we show how to add a key confirmation feature to KEA+ (we call the version with key confirmation KEA+C) and discuss the security properties of KEA+C.
引用
收藏
页码:378 / 394
页数:17
相关论文
共 50 条
  • [21] Fuzzy Authenticated Key Exchange with Tight Security
    Jiang, Mingming
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 337 - 360
  • [22] Enhanced Modelling of Authenticated Key Exchange Security
    Seye, Papa B.
    Sarr, Augustin P.
    SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 36 - 52
  • [23] Efficient KEA-Style Lattice-Based Authenticated Key Exchange
    Wang, Zilong
    Hu, Honggang
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 96 - 109
  • [24] Security Model for Authenticated Key Exchange, Reconsidered
    Zhang, Xichen
    Hashimoto, Keitaro
    Ogata, Wakaha
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT II, SCN 2024, 2024, 14974 : 251 - 271
  • [25] A variant of password authenticated key exchange protocol
    Zhang, Yuexin
    Xiang, Yang
    Wu, Wei
    Alelaiwi, Abdulhameed
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 699 - 711
  • [26] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [27] An novel anonymous authenticated and key exchange protocol
    Cui, Hui
    Cao, Tianjie
    Journal of Networks, 2009, 4 (10) : 985 - 992
  • [28] Authenticated key exchange protocol with selectable identities
    Guo, Hua
    Mu, Yi
    Zhang, Xiyong
    Li, Zhoujun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 226 - 239
  • [29] Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security
    Wei, Fushan
    Ma, Chuangui
    Zhang, Zhenfeng
    PROVABLE SECURITY, 2011, 6980 : 366 - +
  • [30] Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security
    Huang, Hai
    PROVABLE SECURITY, 2011, 6980 : 389 - 397