Abstract
Recently, three key exchange protocols were proposed that integrated the Diffie-Hellman key exchange into the Digital Signature Algorithm (DSA). It was claimed that the protocols provide known-key security and unknown key-share resilience, while the most advanced variant also provides key-replay resilience. However, we show in this Letter that the protocols do not provide forward secrecy and key freshness which are two of the standard security attributes that key exchange protocols should have. We also fix the protocols such that they provide these security attributes.
Original language | English |
---|---|
Pages (from-to) | 570-572 |
Number of pages | 3 |
Journal | IEEE Communications Letters |
Volume | 9 |
Issue number | 6 |
DOIs | |
Publication status | Published - Jun 2005 |
Externally published | Yes |
Keywords
- Communication protocols
- Diffie-Hellman
- Digital Signature Algorithm (DSA)
- Network security