Abstract

Recently, there are some works that developed key exchange protocol by integrating Diffie Hellman key exchange protocol (DHKE) into Digital Signature Algorithm (DSA). It was claimed that the protocols provide known key authentication, forward secrecy, known-key security, unknown key-share attack, key relay attack and key freshness. In this Paper, we show that the protocols do not provide session-state reveal attribute which is one of the standard security attributes that key exchange protocols should have. We also present two new protocols: NDH-GOST1 and NDH-GOST2 which ensure the session-state reveal property.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call