We present a security analysis of the Diffie-Hellman keyexchange protocol authenticated with digital signatures used by the Internet Key Exchange (IKE) standard. The analysis is based on an adaptation of the key-exchange model from [Canetti and Krawczyk, Eurocrypt’ 01] to the setting where peers identities are not necessarily known or disclosed from the start of the protocol. This is a common practical setting, including the case of IKE and other protocols that provide confidentiality of identities over the network. The formal study of this “post-specified peer” model is a further contribution of this paper.
CITATION STYLE
Canetti, R., & Krawczyk, H. (2002). Security analysis of IKE’s signature-based key-exchange protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2442, pp. 143–161). Springer Verlag. https://doi.org/10.1007/3-540-45708-9_10
Mendeley helps you to discover research relevant for your work.