Stronger security of authenticated key exchange

  • Authors:
  • Brian LaMacchia;Kristin Lauter;Anton Mityagin

  • Affiliations:
  • Microsoft Corporation, Redmond, WA;Microsoft Research, Redmond, WA;Microsoft Live Labs, Redmond, WA

  • Venue:
  • ProvSec'07 Proceedings of the 1st international conference on Provable security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent work by Krawczyk [12] and Menezes [16] has highlighted the importance of understanding well the guarantees and limitations of formal security models when using them to prove the security of protocols. In this paper we focus on security models for authenticated key exchange (AKE) protocols. We observe that there are several classes of attacks on AKE protocols that lie outside the scope of the Canetti-Krawczyk model. Some of these additional attacks have already been considered by Krawczyk [12]. In an attempt to bring these attacks within the scope of the security model we extend the Canetti-Krawczyk model for AKE security by providing significantly greater powers to the adversary. Our contribution is a more compact, integrated, and comprehensive formulation of the security model. We then introduce a new AKE protocol called NAXOS and prove that it is secure against these stronger adversaries.