Paper 2010/174

A Reflection on the Security of Two-Party Key Establishment Protocols

Qiang Tang

Abstract

Two-party key establishment has been a very fruitful research area in cryptography, with many security models and numerous protocols proposed. In this paper, we take another look at the YAK protocol and the HMQV protocols and present some extended analysis. Motivated by our analysis, we reflect on the security properties that are desired by two-party key establishment protocols, and their formalizations. In particular, we take into account the interface between a key establishment protocol and the applications which may invoke it, and emphasize the concept of session and the usage of session identifier. Moreover, we show how to design a two-party key establishment protocol to achieve both key authentication and entity authentication properties in our security model.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
key establishmentkey authenticationentity authentication
Contact author(s)
q tang2 @ utwente nl
History
2010-04-01: received
Short URL
https://ia.cr/2010/174
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/174,
      author = {Qiang Tang},
      title = {A Reflection on the Security of Two-Party Key Establishment Protocols},
      howpublished = {Cryptology {ePrint} Archive, Paper 2010/174},
      year = {2010},
      url = {https://eprint.iacr.org/2010/174}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.