|
Mathematical Methods of Cryptography
Forcing future public ephemeral keys to attack authenticated key establishment protocols
E. K. Alekseev, S. N. Kyazhin, S. V. Smyshlyaev CryptoPro LLC, Moscow, Russia
Abstract:
This paper studies the security of the authenticated key establishment protocols against the adversary who has the capability to force the participants to use of ephemeral public values. The paper substantiates the relevance of considering this capability, describes, in particular, attacks on the SIGMA, SIGMA-R, STS-MAC, Echinacea-3 protocols and the post-quantum BKM-KK protocol, and discusses the design features of protocols that allow to protect against attacks of this type.
Keywords:
cryptography, cryptographic protocol, authenticated key establishment, attack, forcing public ephemeral keys.
Citation:
E. K. Alekseev, S. N. Kyazhin, S. V. Smyshlyaev, “Forcing future public ephemeral keys to attack authenticated key establishment protocols”, Prikl. Diskr. Mat., 2024, no. 66, 60–77
Linking options:
https://www.mathnet.ru/eng/pdm856 https://www.mathnet.ru/eng/pdm/y2024/i4/p60
|
|