Security analysis of IKE’s signature-based key-exchange protocol

124Citations
Citations of this article
66Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a security analysis of the Diffie-Hellman keyexchange protocol authenticated with digital signatures used by the Internet Key Exchange (IKE) standard. The analysis is based on an adaptation of the key-exchange model from [Canetti and Krawczyk, Eurocrypt’ 01] to the setting where peers identities are not necessarily known or disclosed from the start of the protocol. This is a common practical setting, including the case of IKE and other protocols that provide confidentiality of identities over the network. The formal study of this “post-specified peer” model is a further contribution of this paper.

Cite

CITATION STYLE

APA

Canetti, R., & Krawczyk, H. (2002). Security analysis of IKE’s signature-based key-exchange protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2442, pp. 143–161). Springer Verlag. https://doi.org/10.1007/3-540-45708-9_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free