100 likes | 256 Views
Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm IEEE Communications Letters, March 2004 Lein Harn, Manish Metha and Wen-Jung Hsin. Presented by Jung-Chen Liu Date : 2004/04/13. Outline. Motivation Introduction Secure DH+DSA key exchange protocols
E N D
Integrating Diffie-Hellman Key Exchange into the Digital Signature Algorithm IEEE Communications Letters, March 2004Lein Harn, Manish Metha and Wen-Jung Hsin Presented by Jung-Chen Liu Date:2004/04/13
Outline • Motivation • Introduction • Secure DH+DSA key exchange protocols • Security analysis • Contributions
Motivation • NIST has published a series of security standards under Federal Information Proceeding Standard (FIPS). But for far, there is no FIPS standard for key agreement between two parties. • DH key agreement(1976) did not provide authentication.
Introduction • In 1993, Arazi suggested replacing the message in the DSA algorithm with DH exchange key (authentication). • In 1994, Nyberg pointed out it cannot resist the known key attack.
Secure DH+DSA key exchange protocols • A. One-Round Protocol:supports noninteractive applications, such as secure e-mail transmission. • B. Two-Round Protocol:interactive application, KAB and KBA are the shared secret keys. • C. Three-Round Protocol:key confirmation.
One-Round Protocol • User A User B Verify DSA signature (rA, sA) of message mA (mA, sA)
Two-Round Protocol • User A User B (mA, sA) (mB, sB)
Three-Round Protocol • User A User B mA (mB, sB) sA
Contribution • This protocol provide multiple secret keys, one for each direction. This arrangement conforms most standard protocols, ex. SSL IPSec… • The shared secret key is included in the signature. Prevent the known key attack and key replay attack. • Three-round protocol achieves key confirmation. Prevent unknown key attack.