Provably secure key exchange: an engineering approach

  • Authors:
  • Yiu Shing Terry Tin;Colin Boyd;Juanma Gonzalez Nieto

  • Affiliations:
  • Information Security Research Centre, Queensland University of Technology, PO Box 2434, Brisbane, QLD 4001, Australia;Information Security Research Centre, Queensland University of Technology, PO Box 2434, Brisbane, QLD 4001, Australia;Information Security Research Centre, Queensland University of Technology, PO Box 2434, Brisbane, QLD 4001, Australia

  • Venue:
  • ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

We promote an engineering approach to design of provably secure key exchange protocols. Using the model of Canetti and Krawczyk we present a systematic method to arrive at efficient and practical protocols with proven security and illustrate its use with existing building blocks. We further show a dual approach which allows protocols with known features to be 'reverse engineered', thereby allowing easier security proofs and providing new building blocks for future designs.