TY - JOUR
T1 - Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic
AU - Imamoto, Kenji
AU - Sakurai, Kouichi
N1 - Funding Information:
1 The authors would like to thank Dr. Wang Guilin and the anonymous referees for their useful comments. This research was partly supported from the grant of Secom Science and Technology Foundation, and the 21st Century COE Program ’Reconstruction of Social Infrastructure Related to Information Science and Electrical Engineering’. Also, the first author was partly supported from JSPS Research Fellowships for Young Scientists, 2004, 06737. 2 Email:[email protected] 3 Email: [email protected]
PY - 2005/7/5
Y1 - 2005/7/5
N2 - Authenticated key exchange protocols have been developed to establish secure channel on the Internet. In this paper, we consider following attacks against an authenticated key exchange using shared secret: eavesdropping, DoS attack, replay attack, and impersonation. Besides prevention from all these attacks, efficiency is also important. In this paper, we propose a three-party authenticated key exchange protocol based on Diffie-Hellman key exchange with one-time ID, which is a user's extraordinary identity used only once [K. Imamoto, K. Sakurai, Notes on Dynamic Information Management for Authenticated Key Exchange, ISEC, March 2003; H. Krawczyk, The IKE-SIGMA Protocol, Internet Draft, Nov 2001. http://www.ee.technion.ac.il/~hugo/draft-krawczyk-ipsec-ike- sigma-00.txt]. Moreover, we analyze our proposal by SVO Logic, which is one of formal methods to analyze cryptographic protocols [P. Syverson and P. C. van Oorschot. A Unified Cryptographic Protocol Logic. NRL CHAOS Report, 5540-227, 1996; P. Syverson and I. Cervesato. The Logic of Authentication Protocols. FOSAD'00, LNCS2171, pp.63-137, 2001], and show what assumptions are needed.
AB - Authenticated key exchange protocols have been developed to establish secure channel on the Internet. In this paper, we consider following attacks against an authenticated key exchange using shared secret: eavesdropping, DoS attack, replay attack, and impersonation. Besides prevention from all these attacks, efficiency is also important. In this paper, we propose a three-party authenticated key exchange protocol based on Diffie-Hellman key exchange with one-time ID, which is a user's extraordinary identity used only once [K. Imamoto, K. Sakurai, Notes on Dynamic Information Management for Authenticated Key Exchange, ISEC, March 2003; H. Krawczyk, The IKE-SIGMA Protocol, Internet Draft, Nov 2001. http://www.ee.technion.ac.il/~hugo/draft-krawczyk-ipsec-ike- sigma-00.txt]. Moreover, we analyze our proposal by SVO Logic, which is one of formal methods to analyze cryptographic protocols [P. Syverson and P. C. van Oorschot. A Unified Cryptographic Protocol Logic. NRL CHAOS Report, 5540-227, 1996; P. Syverson and I. Cervesato. The Logic of Authentication Protocols. FOSAD'00, LNCS2171, pp.63-137, 2001], and show what assumptions are needed.
UR - http://www.scopus.com/inward/record.url?scp=23144441485&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=23144441485&partnerID=8YFLogxK
U2 - 10.1016/j.entcs.2005.06.003
DO - 10.1016/j.entcs.2005.06.003
M3 - Conference article
AN - SCOPUS:23144441485
SN - 1571-0661
VL - 135
SP - 79
EP - 94
JO - Electronic Notes in Theoretical Computer Science
JF - Electronic Notes in Theoretical Computer Science
IS - 1
T2 - Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005)
Y2 - 16 July 2005 through 16 July 2005
ER -