4 Hits in 7.6 sec

Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard

Alfred Menezes, Berkant Ustaoglu
2008 Proceedings of the 2008 ACM symposium on Information, computer and communications security - ASIACCS '08  
The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 800-56A standard.  ...  In this paper we present a strengthening of the Canetti-Krawczyk security definition for key agreement that captures resistance to all important attacks that have been identified in the literature with  ...  INTRODUCTION The 'unified model' is a family of two-party Diffie-Hellman key agreement protocols that has been standardized in ANSI X9.42 [1], ANSI X9.63 [2] , and NIST SP 800-56A [15] .  ... 
doi:10.1145/1368310.1368348 dblp:conf/ccs/MenezesU08 fatcat:5jnr3r5henerlc62j7tfvxw4ea

Reusing Static Keys in Key Agreement Protocols [chapter]

Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu
2009 Lecture Notes in Computer Science  
Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard.  ...  We also propose an enhancement of the extended Canetti-Krawczyk security model and definition for the situation where static public keys are reused in two or more key agreement protocols.  ...  Our work is motivated by the NIST SP 800-56A standard for key establishment [22] .  ... 
doi:10.1007/978-3-642-10628-6_3 fatcat:5won3rndsbd3toy2maahtgzkqm

A Cryptographic Analysis of OPACITY [chapter]

Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
2013 Lecture Notes in Computer Science  
Our results indicate that the ZKM version does not achieve even very basic security guarantees. The FS protocol, on the other hand, provides a decent level of security for key establishment.  ...  This Diffie-Hellman-based protocol is supposed to provide a secure and privacy-friendly key establishment for contactless environments.  ...  Acknowledgments Marc Fischlin was supported by a Heisenberg grant Fi 940/3-1 of the German Research Foundation (DFG). This work was supported by CASED ( and by EC SPRIDE.  ... 
doi:10.1007/978-3-642-40203-6_20 fatcat:rbibehz2evgjncwexcr7mw4wga

Ein bewölkter Himmel für Urheber?

Christian Stögerer
2013 unpublished
An diesem Begriff kommt man daher in den Fachmedien kaum vorbei.  ...  In der Arbeit wird deutlich, wie schwierig die Einordnung der m [...]  ...  /Draft-SP-800-145_cloud-definition.pdf 246 NIST, The NIST Definition of Cloud Computing (draft), 6.  ... 
doi:10.25365/thesis.27395 fatcat:nhu6fwkg4zhjjonfwel6bsv7ny