Security analysis of KEA authenticated key exchange protocol

被引:0
|
作者
Lauter, Kristin
Mityagin, Anton
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] Univ Calif San Diego, Dept Comp Sci, La Jolla, CA 92037 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
KEA is a Diffie-Hellman based key-exchange protocol developed by NSA which provides mutual authentication for the parties. It became publicly available in 1998 and since then it was neither attacked nor proved to be secure. We analyze the security of KEA and find that the original protocol is susceptible to a class of attacks. On the positive side, we present a simple modification of the protocol which makes KEA secure. We prove that the modified protocol, called KEA+, satisfies the strongest security requirements for authenticated key-exchange and that it retains some security even if a secret key of a party is leaked. Our security proof is in the random oracle model and uses the Gap Diffie-Hellman assumption. Finally, we show how to add a key confirmation feature to KEA+ (we call the version with key confirmation KEA+C) and discuss the security properties of KEA+C.
引用
收藏
页码:378 / 394
页数:17
相关论文
共 50 条
  • [41] Authenticated key exchange protocol with enhanced freshness properties
    Huang, Hai
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1130 - 1136
  • [42] Authenticated Key Exchange Protocol in One-Round
    Zhang, Xing-Lan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2009, 5574 : 226 - 233
  • [43] Authenticated key exchange protocol for medical sensor network
    Deng, Miaolei
    Huang, Zhaohe
    Lu, Zhibo
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (08): : 69 - 72
  • [44] A secure authenticated key exchange protocol for credential services
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 139 - 149
  • [45] A New Anonymous Ring Authenticated Key Exchange Protocol
    Hui Cui
    Cao, Tianjie
    ISIP: 2009 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING, PROCEEDINGS, 2009, : 221 - 224
  • [46] Cryptanalysis of a strongly secure authenticated key exchange protocol
    PLA Information Engineering University, Zhengzhou 450002, China
    不详
    Dianzi Yu Xinxi Xuebao, 2013, 9 (2278-2282):
  • [47] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [48] Authenticated Key-Exchange Protocol for Heterogeneous CPS
    Harishma, Boyapally
    Patranabis, Sikhar
    Chatterjee, Urbi
    Mukhopadhyay, Debdeep
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 849 - 851
  • [49] Parallelizable password-authenticated key exchange protocol
    Lee, SW
    Yoo, KY
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 1014 - 1019
  • [50] Tripartite authenticated key exchange protocol for smart grid
    Wang S.
    Zhou X.
    Wen K.
    Weng B.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 210 - 218