Security Arguments for the Um Key Agreement Protocol in the Nist Sp 800-56a Standard
| dc.contributor.author | Menezes, Alfred | |
| dc.contributor.author | Ustaoğlu, Berkant | |
| dc.coverage.doi | 10.1145/1368310.1368348 | |
| dc.date.accessioned | 2017-02-01T08:26:21Z | |
| dc.date.available | 2017-02-01T08:26:21Z | |
| dc.date.issued | 2008 | |
| dc.description | ACM Symposium on Information, Computer and Communications Security, ASIACCS '08; Tokyo; Japan; 18 March 2008 through 20 March 2008 | en_US |
| dc.description.abstract | The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 800-56A standard. The UM protocol is believed to possess all important security attributes including key authentication and secrecy, resistance to unknown key-share attacks, forward secrecy, resistance to known-session key attacks, and resistance to leakage of ephemeral private keys, but is known to succumb to key-compromise impersonation attacks. In this paper we present a strengthening of the Canetti-Krawczyk security definition for key agreement that captures resistance to all important attacks that have been identified in the literature with the exception of key-compromise impersonation attacks. We then present a reductionist security proof that the UM protocol satisfies this new definition in the random oracle model under the Gap Diffie-Hellman assumption. Copyright 2008 ACM. | en_US |
| dc.identifier.citation | Menezes, A., and Ustaoğlu, B. (2008, March). Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Paper presented at the Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan (261-270). New York, N.Y. : ACM Press. | en_US |
| dc.identifier.doi | 10.1145/1368310.1368348 | |
| dc.identifier.doi | 10.1145/1368310.1368348 | en_US |
| dc.identifier.isbn | 9781595939791 | |
| dc.identifier.uri | http://doi.org/10.1145/1368310.1368348 | |
| dc.identifier.uri | https://hdl.handle.net/11147/4770 | |
| dc.language.iso | en | en_US |
| dc.publisher | Association for Computing Machinery (ACM) | en_US |
| dc.relation.ispartof | ACM Symposium on Information, Computer and Communications Security, ASIACCS '08 | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Network protocols | en_US |
| dc.subject | Key agreement protocols | en_US |
| dc.subject | NIST SP 800-56A | en_US |
| dc.subject | Provable security | en_US |
| dc.subject | Security model | en_US |
| dc.title | Security Arguments for the Um Key Agreement Protocol in the Nist Sp 800-56a Standard | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.institutional | Ustaoğlu, Berkant | |
| gdc.author.yokid | 102756 | |
| gdc.bip.impulseclass | C4 | |
| gdc.bip.influenceclass | C4 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | open access | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.department | İzmir Institute of Technology. Mathematics | en_US |
| gdc.description.endpage | 270 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | N/A | |
| gdc.description.startpage | 261 | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W2044966683 | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 9.0 | |
| gdc.oaire.influence | 4.2440385E-9 | |
| gdc.oaire.isgreen | true | |
| gdc.oaire.keywords | Security model | |
| gdc.oaire.keywords | Provable security | |
| gdc.oaire.keywords | Network protocols | |
| gdc.oaire.keywords | Key agreement protocols | |
| gdc.oaire.keywords | NIST SP 800-56A | |
| gdc.oaire.popularity | 1.919938E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0211 other engineering and technologies | |
| gdc.oaire.sciencefields | 0102 computer and information sciences | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.oaire.sciencefields | 01 natural sciences | |
| gdc.openalex.collaboration | International | |
| gdc.openalex.fwci | 3.81616977 | |
| gdc.openalex.normalizedpercentile | 0.95 | |
| gdc.openalex.toppercent | TOP 10% | |
| gdc.opencitations.count | 18 | |
| gdc.plumx.crossrefcites | 18 | |
| gdc.plumx.mendeley | 27 | |
| gdc.plumx.scopuscites | 22 | |
| relation.isAuthorOfPublication.latestForDiscovery | e58ceea7-82b9-4d8c-a531-02cb47780412 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | 9af2b05f-28ac-4012-8abe-a4dfe192da5e |
