Security Analysis of IKE’s Signature-Based Key-Exchange Protocol

  • Ran Canetti
  • Hugo Krawczyk
Conference paper

DOI: 10.1007/3-540-45708-9_10

Volume 2442 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Canetti R., Krawczyk H. (2002) Security Analysis of IKE’s Signature-Based Key-Exchange Protocol. In: Yung M. (eds) Advances in Cryptology — CRYPTO 2002. CRYPTO 2002. Lecture Notes in Computer Science, vol 2442. Springer, Berlin, Heidelberg


We present a security analysis of the Diffie-Hellman key- exchange protocol authenticated with digital signatures used by the Internet Key Exchange (IKE) standard. The analysis is based on an adaptation of the key-exchange model from [Canetti and Krawczyk, Eurocrypt’

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Ran Canetti
    • 1
  • Hugo Krawczyk
    • 2
  1. 1.T.J. Watson Research CenterIBMUSA
  2. 2.EE DepartmentTechnionHaifaIsrael