Date: 13 Sep 2002

Security Analysis of IKE’s Signature-Based Key-Exchange Protocol


We present a security analysis of the Diffie-Hellman key- exchange protocol authenticated with digital signatures used by the Internet Key Exchange (IKE) standard. The analysis is based on an adaptation of the key-exchange model from [Canetti and Krawczyk, Eurocrypt’

This proceedings version lacks most proof details essential for the results presented here; for a complete version see [4].
Supported by Irwin and Bethea Green & Detroit Chapter Career Development Chair.