LNCS 2729 – SIGMA: The `SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols 1st Edition by Hugo Krawczyk – Ebook PDF Instant Download/Delivery. 3540451463, 9783540451464
Full download LNCS 2729 – SIGMA: The `SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols 1st Edition after payment
Product details:
ISBN 10: 3540451463
ISBN 13: 9783540451464
Author: Hugo Krawczyk
LNCS 2729 – SIGMA: The `SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols 1st Edition:
We present the SIGMA family of key-exchange protocols and the “SIGn-and-MAc” approach to authenticated Diffie-Hellman underlying its design. The SIGMA protocols provide perfect forward secrecy via a Diffie-Hellman exchange authenticated with digital signatures, and are specifically designed to ensure sound cryptographic key exchange while providing a variety of features and trade-offs required in practical scenarios (such as optional identity protection and reduced number of protocol rounds). As a consequence, the SIGMA protocols are very well suited for use in actual applications and for standardized key exchange. In particular, SIGMA serves as the cryptographic basis for the signature-based modes of the standardized Internet Key Exchange (IKE) protocol (versions 1 and 2).
This paper describes the design rationale behind the SIGMA approach and protocols, and points out to many subtleties surrounding the design of secure key-exchange protocols in general, and identity-protecting protocols in particular. We motivate the design of SIGMA by comparing it to other protocols, most notable the STS protocol and its variants. In particular, it is shown how SIGMA solves some of the security shortcomings found in previous protocols.
LNCS 2729 – SIGMA: The `SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols 1st Edition Table of contents:
1 Introduction
2 Preliminaries: On the Security of Key-Exchange Protocols
2.1 Overview of the Security Model and Requirements
2.2 Identity Protection
2.3 Further Remarks and Notation
3 The STS Protocols
3.1 BADH and the Identity-Misbinding Attack: A Motivating Example
3.2 The Basic STS Protocol
3.3 Two STS Variants: MACed-Signature and Photuris
4 The ISO Protocol
5 The SIGMA Protocols
5.1 The Basic SIGMA Protocol
5.2 Protecting Identities: SIGMA-I
5.3 A Four Message Variant: SIGMA-R
5.4 Further Variants and the Use of SIGMA in IKE
People also search for LNCS 2729 – SIGMA: The `SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols 1st Edition:
does diffie hellman provide authentication
is diffie-hellman secure
is diffie hellman symmetric
authenticated key exchange protocol
diffie-hellman attack