Security analysis and applications of standard key agreement protocols

  • Authors:
  • Soohyun Oh;Jin Kwak;Seungwoo Lee;Dongho Won

  • Affiliations:
  • School of Information and Communications Engineering, Sungkyunkwan University, Korea;School of Information and Communications Engineering, Sungkyunkwan University, Korea;School of Information and Communications Engineering, Sungkyunkwan University, Korea;School of Information and Communications Engineering, Sungkyunkwan University, Korea

  • Venue:
  • ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The use of cryptographic system to provide the privacy of transmitted message over network is increasing gradually. A key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardize the key agreement protocols is in rapid progress. In this paper, we study properties and operation of standard key agreement protocols and analyze the security of their protocols under several active attacker models such as active impersonation, key-compromised impersonation, (full/half) forward secrecy, known-key passive attack, known-key impersonation attack and so on. Then, we suggest the standard for selecting key agreement protocols for each application, and find the most suitable key agreement protocol for each application.