[Resource Topic] 2009/253: Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange

Welcome to the resource topic for 2009/253

Title:
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange

Authors: Cas J. F. Cremers

Abstract:

Many recent key exchange (KE) protocols have been proven secure in the CK, CK-HMQV, or eCK security models. The exact relation between these security models, and hence between the security guarantees provided by the protocols, is unclear. First, we show that the CK, CK-HMQV, and eCK security models are formally incomparable. Second, we show that these models are also practically incomparable, by providing for each model attacks that are not considered by the other models. Our analysis enables us to find several previously unreported flaws in existing protocol security proofs. We identify the causes of these flaws and show how they can be avoided.

ePrint: https://eprint.iacr.org/2009/253

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .