搜索结果: 1-15 共查到“军事学 key exchange protocols”相关记录21条 . 查询时间(0.099 秒)
Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters
AKE provable security tightness
2019/6/24
In this paper we give nearly-tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols which are extremely simple and efficient. Unli...
Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3
key exchange hybrid key exchange
2018/1/2
Broken cryptographic algorithms and hardness assumptions are a constant threat to real-world protocols. Prominent examples are hash functions for which collisions become known, or number-theoretic ass...
Group key exchange protocols withstanding ephemeral-key reveals
Group Key Agreement Strong Security Ephemeral Keys
2016/12/29
When a group key exchange protocol is executed, the session key is typically extracted from two types of secrets;
long-term keys (for authentication) and freshly generated (often random) values. The ...
Key-exchange protocols such as TLS, SSH, IPsec, and ZRTP are highly configurable, with typical deployments supporting multiple protocol versions, cryptographic algorithms and parameters. In the first ...
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols
Provable Security Security Protocols EasyCrypt
2016/1/4
Using EasyCrypt, we formalize a new modular security proof for one-round authenticated key exchange protocols in the random oracle model. Our proof improves earlier work by Kudla and Paterson (ASIACRY...
A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0
Authenticated Key Exchange Security Model Security Analysis
2015/12/29
The Trusted Platform Module (TPM) version 2.0 provides an authenticated key exchange
functionality by a single key exchange primitive, which can be called to implement three
key exchange protocols (...
In many pairing-based protocols more than one party is involved, and some or all of them may be required to calculate pairings. Commonly it is the pairing calculation itself which takes most time. How...
Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model
public-key cryptography
2014/3/12
The extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for authenticated key exchange protocols that capture leakage of various kinds of secret information ...
Security weakness of two authenticated key exchange protocols from pairings
Key compromise impersonation attack Authenticated key exchange Multiple key Perfect forward secrecy
2010/7/13
Recently, Liu proposed two authenticated multiple key exchange protocols using pairings, and claimed two protocols featured many security attributes. In this paper, we show that Liu’s protocols are in...
Two improved authenticated multiple key exchange protocols
Cryptography authentication key exchange security Bilinear pairing
2010/7/13
Many authenticated multiple key exchange protocols were published in recent years. In 2008, Lee et al. presented an authenticated multiple key exchange protocol based on bilinear pairings. However, Vo...
Authenticated Key Exchange Protocols with Enhanced Freshness Properties
Authenticated key exchange Random oracle Provably secure
2009/11/18
In this paper, we investigate the security model for
authenticated key exchange protocols. We observe that there is
further room to extend the latest enhanced Canetti-Krawczyk
(eCK) model.
We furt...
Security Weakness in Two Authenticated Key Exchange Protocols
Authenticated key exchange Key compromise impersonation attack Ephemeral key compromise attack
2009/11/18
In ICA3PP 2009, Xinglan Zhang proposed two one-round
authenticated key exchange protocols and proved their security in the
standard model. In this paper, we analyze these two protocols and find
tha...
Computational Soundness for Key Exchange Protocols with Symmetric Encryption
Computational Soundness Key Exchange Protocols Symmetric Encryption
2009/8/18
Formal analysis of security protocols based on symbolic models has
been very successful in finding
aws in published protocols and prov-
ing protocols secure, using automated tools. An important qu...
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
Group Key Exchange Key Compromise Impersonation Insider Attacks
2009/6/23
A key exchange protocol allows a set of parties to agree upon a secret session key over a
public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various
models c...
Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols
Group Diffie-Hellman Key Exchange Protocol password guessing attacks off-line and undetectable
2009/2/16
In [3], Tang presented two password guessing attacks such as off-line and undetectable
on-line dictionary attacks against password-based group Diffie-Hellman key exchange protocols
by Byun and Lee [...