Analysis of Key-Exchange protocols and their use for building secure channels

Ran Canetti, Hugo Krawczyk

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1288 Scopus citations

Abstract

We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys some important analytical benefits: (i) any key-exchange protocol that satisfies the security definition can be composed with symmetric encryption and authentication functions to provide provably secure communication channels (as defined here); and (ii) the definition allows for simple modular proofs of security: one can design and prove security of key-exchange protocols in an idealized model where the communication links are perfectly authenticated, and then translate them using general tools to obtain security in the realistic setting of adversary-controlled links. We exemplify the usability of our results by applying them to obtain the proof of two classes of key-exchange protocols, Diffie-Hellman and key-transport, authenticated via symmetric or asymmetric techniques.

Original languageEnglish
Title of host publicationAdvances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsBirgit Pfitzmann
PublisherSpringer Verlag
Pages453-474
Number of pages22
ISBN (Print)3540420703
DOIs
StatePublished - 2001
Externally publishedYes
EventInternational Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2001 - Innsbruck, Austria
Duration: 6 May 200110 May 2001

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2045
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2001
Country/TerritoryAustria
CityInnsbruck
Period6/05/0110/05/01

Fingerprint

Dive into the research topics of 'Analysis of Key-Exchange protocols and their use for building secure channels'. Together they form a unique fingerprint.

Cite this