Security analysis of IKE’s signature-based key-exchange protocol

124Citations
Citations of this article
66Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a security analysis of the Diffie-Hellman keyexchange protocol authenticated with digital signatures used by the Internet Key Exchange (IKE) standard. The analysis is based on an adaptation of the key-exchange model from [Canetti and Krawczyk, Eurocrypt’ 01] to the setting where peers identities are not necessarily known or disclosed from the start of the protocol. This is a common practical setting, including the case of IKE and other protocols that provide confidentiality of identities over the network. The formal study of this “post-specified peer” model is a further contribution of this paper.

References Powered by Scopus

Universally composable security: A new paradigm for cryptographic protocols

2191Citations
N/AReaders
Get full text

Entity authentication and key distribution

1122Citations
N/AReaders
Get full text

A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack

1036Citations
N/AReaders
Get full text

Cited by Powered by Scopus

SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols

256Citations
N/AReaders
Get full text

Lattice cryptography for the internet

253Citations
N/AReaders
Get full text

On the security of TLS-DHE in the standard model

150Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Canetti, R., & Krawczyk, H. (2002). Security analysis of IKE’s signature-based key-exchange protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2442, pp. 143–161). Springer Verlag. https://doi.org/10.1007/3-540-45708-9_10

Readers over time

‘09‘10‘11‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘23‘240481216

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 43

75%

Researcher 6

11%

Professor / Associate Prof. 5

9%

Lecturer / Post doc 3

5%

Readers' Discipline

Tooltip

Computer Science 45

76%

Mathematics 8

14%

Physics and Astronomy 3

5%

Engineering 3

5%

Save time finding and organizing research with Mendeley

Sign up for free
0