Security analysis of the cliques protocols suites: First results

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting. In this paper, we are analysing the A-GDH.2 suite that is intended to allow a group to share an authenticated key and to perform dynamic changes in the group constitution (adding and deleting members, ...). We are proposing an original method to analyze these protocols and are presenting a number of unpublished flaws with respect to each of the main security properties claimed in protocol definitions (key authentication, perfect forward secrecy, resistance to known-keys attacks). Most of these flaws arise from the fact that using a group setting does not allow to reason about security properties in the same way as when only two (or three) parties are concerned. © 2002 Kluwer Academic / Plenum Publishers, New York.

Cite

CITATION STYLE

APA

Pereira, O., & Quisquater, J. J. (2002). Security analysis of the cliques protocols suites: First results. In IFIP Advances in Information and Communication Technology (Vol. 65, pp. 151–166). Springer New York LLC. https://doi.org/10.1007/0-306-46998-7_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free