1. Attack on 'Strong Diffie-Hellman-DSA KE' and Improvement
- Author
-
Demba Sow, Mamadou Ghouraissiou Camara, and Djiby Sow
- Subjects
Diffie–Hellman key exchange ,Elliptic curve ,Property (philosophy) ,Forward secrecy ,Ephemeral key ,Key (cryptography) ,Computer security ,computer.software_genre ,computer ,Protocol (object-oriented programming) ,Key exchange ,Mathematics - Abstract
In this paper, we do a cryptanalyse of the so called ``Strong Diffie-Hellman-DSA Key Exchange (briefly: SDH-DSA-KE)" and after we propose ``Strong Diffie-Hellman-Exponential-Schnnor Key Exchange (briefly: SDH-XS-KE)" which is an improvement for efficiency and security. SDH-XS-KE protocol is secure against Session State Reveal (SSR) attacks, Key independency attacks, Unknown-key share (UKS) attacks and Key-Compromise Impersonation (KCI) attacks. Furthermore, SDH-XS-KE has Perfect Forward Secrecy (PFS) property and a key confirmation step. The new proposition is not vulnerable to Disclosure to ephemeral or long-term Diffie-Hellman exponents. We design our protocol in finite groups therefore this protocol can be implemented in elliptic curves.
- Published
- 2014