Abstract
We present a security analysis of the Diffie-Hellman key- exchange protocol authenticated with digital signatures used by the Internet Key Exchange (IKE) standard. The analysis is based on an adaptation of the key-exchange model from [Canetti and Krawczyk, Eurocrypt’
This proceedings version lacks most proof details essential for the results presented here; for a complete version see [4].
Supported by Irwin and Bethea Green & Detroit Chapter Career Development Chair.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M. Bellare, R. Canetti and H. Krawczyk, “A modular approach to the design and analysis of authentication and key-exchange protocols”, 30th STOC, 1998.
M. Bellare and P. Rogaway, “Entity authentication and key distribution”, Advances in Cryptology, — CRYPTO’93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994, pp. 232–249.
R. Canetti, “Universally Composable Security: A New paradigm for Cryptographic Protocols”, 42nd FOCS, 2001. Full version available at http://www.eprint.iacr.org/2000/067.
Canetti, R., and Krawczyk, H., “Security Analysis of IKE’s Signature-based Key-Exchange Protocol”, full version. Cryptology ePrint Archive (http://www.eprint.iacr.org/), 2002.
Canetti, R., and Krawczyk, H., “Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels”, Advances in Cryptology — EUROCRYPT 2001, Full version in: http://www.eprint.iacr.org/2001/040.
Canetti, R., and Krawczyk, H., “Universally Composable Notions of Key Exchange and Secure Channels”, Eurocrypt 02, 2002. Full version available at http://www.eprint.iacr.org/2002/059.
R. Cramer and V. Shoup, “A Practical Public Key Cryptosystem Provable Secure Against Adaptive Chosen Ciphertext Attack”, In Crypto’ 98, LNCS No. 1462, pages 13–25, 1998.
W. Diffie, P. van Oorschot and M. Wiener, “Authentication and authenticated key exchanges”, Designs, Codes and Cryptography, 2, 1992, pp. 107–125.
Gennaro, R., Krawczyk H., and Rabin, T., “Hashed Diffie-Hellman: A Hierarchy of Diffie-Hellman Assumptions”, manuscript, Feb 2002.
O. Goldreich, “Foundations of Cryptography: Basic Tools”, Cambridge Press, 2001.
D. Harkins and D. Carrel, ed., “The Internet Key Exchange (IKE)”, RFC 2409, Nov. 1998.
ISO/IEC IS 9798-3, “Entity authentication mechanisms-Part 3: Entity authentication using asymmetric techniques”, 1993.
Karn, P., and Simpson W.A., “The Photuris Session Key Management Protocol”, draft-ietf-ipsec-photuris-03.txt, Sept. 1995.
S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol”, Request for Comments 2401, Nov. 1998.
Krawczyk, H., “SKEME: A Versatile Secure Key Exchange Mechanism for Internet,”, Proceedings of the 1996 Internet Society Symposium on Network and Distributed System Security, Feb. 1996, pp. 114–127.
Krawczyk, H., IPsec mailing list archives, http://www.vpnc.org/ietf-ipsec/, April-June 1995.
Krawczyk, H., “The order of encryption and authentication for protecting communications (Or: how secure is SSL?)”, Crypto’2001. Full version in: Cryptology ePrint Archive (http://www.eprint.iacr.org/), Report 2001/045.
Krawczyk, H., “SIGMA: the’ sIGn-and-MAc’ Approach to Authenticated Diffie-Hellman Protocols”, http://www.ee.technion.ac.il/~hugo/sigma.html
Meadows, C., “Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer”, Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 1999.
A. Menezes, P. Van Oorschot and S. Vanstone, “Handbook of Applied Cryptography,” CRC Press, 1996.
Orman, H., “The OAKLEY Key Determination Protocol”, Request for Comments 2412, Nov. 1998.
V. Shoup, “On Formal Models for Secure Key Exchange”, Theory of Cryptography Library, 1999. Available at: http://www.philby.ucsd.edu/cryptolib/1999/99-12.html.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Canetti, R., Krawczyk, H. (2002). Security Analysis of IKE’s Signature-Based Key-Exchange Protocol. In: Yung, M. (eds) Advances in Cryptology — CRYPTO 2002. CRYPTO 2002. Lecture Notes in Computer Science, vol 2442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45708-9_10
Download citation
DOI: https://doi.org/10.1007/3-540-45708-9_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44050-5
Online ISBN: 978-3-540-45708-4
eBook Packages: Springer Book Archive