A Study On Diffie-Hellman Key Exchange Protocols
A Study On Diffie-Hellman Key Exchange Protocols
net/publication/317339928
CITATIONS READS
11 6,316
2 authors:
All content following this page was uploaded by Manoj Ranjan Mishra on 31 August 2019.
A STUDY ON
DIFFIE-HELLMAN KEY EXCHANGE PROTOCOLS
Manoj Ranjan Mishra1 , Jayaprakash Kar2 §
1 School
of Computer Application
KIIT University, Bhubaneswar, INDIA
2 Department of Computer Science and Engineering
Abstract: Securing network traffic has always been a must requirement for any network
application that employs insecure communication channel. The reason is to provide protection
for the transmitted data over the network against unauthorized disclosure and modification of
the messages between communicating parties. A Key exchange protocol is the cryptographic
primitive that can establish a secure communication. The first Key exchange protocol was
introduced by Diffie-Hellman. The purpose of the Diffie-Hellman protocol is to enable two
parties to securely exchange a session key which can then be used for next symmetric encryp-
tion of messages. However, Diffie-Hellman itself does not authenticate the communicating
entities. In this paper, we study on Diffie-Hellman Key exchange protocol. Subsequently
describe authenticated key exchange protocol and One-pass key exchange protocol, which are
the variants of Diffie-Hellman protocol.
Key Words: authenticated key exchange, key compromise impersonating attack, ephemeral
key compromise attack
1. Introduction
The need for a key exchange protocol over an insecure communication channel
Received: May 5, 2016
c 2017 Academic Publications, Ltd.
Revised: April 28, 2017
url: www.acadpubl.eu
Published: April 28, 2017
§ Correspondence author
180 M.R. Mishra, J. Kar
2. Preliminaries: Notation
Notation Meaning
pand q Large prime numbers of group G
g generator of the group G and finite cyclic group of large enough
order that makes Diffie-Hellman problem difficult
XA Static private key of Alice
XB Static private key of Bob
Y A = g XA Static public key of Alice
Y B = g XB Static public key of Bob
RA ∈ Zp∗ Ephemeral random integer of Alice
RB ∈ Zp∗ Ephemeral random integer of Bob
RD ∈ Zp∗ Ephemeral random integer of Darth
Ki Session key generated by the party i
r ephemeral private key
R ephemeral public key, R = rP
|| concatenation symbol
T time-stamp
⊕ XOR operation
H Hash function
• Step1: Darth picks two random private keys XD1 and XD2 to compute
the public keys YD1 and YD2 , respectively.
From now on, Darth can access and read or/and modify any subsequent mes-
sages between Bob and Alice. Because the session keys of both Alice and Bob
are shared with Darth. Diffie–Hellman protocol does not provide authentication
of the communicating parties and consequently it is vulnerable to a man-in-the-
middle attack. This vulnerability can be avoided with the use of authentication
mechanisms such as digital signatures and public- key certificates.
two-party authenticated key exchange, the legitimate parties can compute a se-
cret key using Diffie-Hellman and then authenticating each other by exchanging
their digital signatures. As a result, STS should be secure against a man-in-
the-middle attack. Now we will discuss the basic setup of STS protocol. Let’s
assume that the setup data of Diffie-Hellman has been shared between Alice
and Bob, and they know each other’s public keys using digital certificates. STS
protocol proceeds as follows:
• Alice → Bob : g x
• Step4: Bob decrypts and verifies Alice’s signature using Alice’s public
key YA in the same way as Bob did in the previous step. We can formalize
STS steps in the following way:
We should notice that STS protocol provides forward secrecy as one of the
desirable properties in authenticated key exchange protocols. This is achieved
due to the Diffie-Hellman protocol which will employs short-term keys for sub-
sequent sessions. The private keys of Alice and Bob are long-term keys and
if either one is compromised, the previous sessions are unaffected. Another
184 M.R. Mishra, J. Kar
property of STS protocol is that it is efficient and does not need redundant ex-
change of elements with each session due to the use of certificates that shorten
the exchange process without consulting a central authority.
Designing secure AKE protocol is a non-trivial problem. Security loopholes
in a variety of protocols have been discovered later, after they were adopted.
A new type of attack called key compromise impersonation attack (KCI) has
been considered to AKE protocol in 1996 by Just and Vaudenay [8]. KCI, as its
name indicates, is the situation in which the adversary discloses the private key
of either party and be able to masquerade as either legitimate party. Recent
AKE protocols are examined to KCI attack. For example, the efficient one-pass
asymmetric AKE has been examined by K. Chalkias et al. in 2008 [1].
The Canetti-Krawczyk (CK) model is a formal method to design and an-
alyze secure key agreement protocols by satisfying some desirable security at-
tributes [9]. This model has been extended by LaMacchia et al. [10] to formally
consider a new problem called the ephemeral key compromise (EKC) attack.
Ephemeral key is a cryptographic key generated once for each key establishment
session. EKC involves disclosing the private, ephemeral keys of either party or
then computing the session key consequently by the adversary.
There are several key exchange protocols proposed either to improve the
secrecy of existing ones or to make new ones that cover a specific need [11] [12]
[13] [14] [15] [16]. Complexity, high computational and communication cost
of proposed protocols make them not proper for applications that require one
way communication. Examples of these applications include email, SMS and
printers. In these applications, the receiving party cannot reply instantly or
will not reply as in case of printers. To meet the requirements of these new
applications, key exchange protocols have been developed [15] [17]. In these
protocols, one and only one of the party members are responsible of session
key creation. For this reason, these protocols are called one-pass two-party key
exchange protocol.
One-pass key exchange protocols are mostly authenticated implicitly. This
means the two communicating parties assume that they are the only ones who
know the value of the session key and no one else can learn this value. This is
considered an advantage for one-pass protocols. However, this type of key ex-
change protocols cannot provide known key security against the attacker when
the later has already recorded a previous run of the protocol and used it for
replay attacks. Other drawbacks of one-pass protocols include not supporting
perfect forward secrecy (PFS), lack of key control and pruning to key compro-
mise impersonation attacks. The last drawback leads to serious consequences
such as reading past/future messages and extracting new information that is
A STUDY ON... 185
not even exchanged between the parties. This makes studying the attack deeply
a motivation to propose a protocol that resists it.
5. One-Pass Protocols
One-pass protocols allow both parties Alice and Bob to establish a session key
after sending a single message from Alice to Bob in case an authenticated copy
of Bob’s public key is already with Alice. Two-pass protocol is made one-pass
by replacing Bob’s ephemeral public key with his static public key [18]. K.
Chalkias et al. [1] have used this technique to convert two-pass protocols to
one-pass such as converting Unified Model (UM) [19], Key Exchange Algorithm
(KEA) [20] and modified version of KEA(KEA+) [21]. It’s assumed that each
party among Alice and Bob has already the static private and public keys. The
public key is already delivered between party members and verified by each one
of them. Based on this assumption, the converted protocols work as follows:
• Alice generates an ephemeral key pair (r, R) and sends the public
ephemeral key R along with her identity IDA to Bob. Note that the
ephemeral key pair is randomly created for each session. This key
is used once and then destroyed as the session ends so that it is not
going to be recoverable.
• Bob receives the public ephemeral key from Alice. He computes the
session key Kb = XB YA ⊕ XB .R
• Alice computes the session key Ka = XA YB ⊕ YB .r
• Conversion of Key Exchange Algorithm (KEA)to One-Pass Protocol
– Alice generates an ephemeral key pair (r, R) and sends the public
ephemeral key R along with her identity IDA to Bob.
– Bob receives the public ephemeral key from Alice. He computes
the session key
Kb = XB YA ⊕ XB .R
• Alice generates an ephemeral key pair (r, R) and sends the public ephemeral
key R along with her identity IDA to Bob.
• Bob receives the public ephemeral key from Alice. He computes the ses-
sion key
• KCI attack lets the corrupted party to receive information and data which
threatens him such as viruses, malware and spyware. Usually this content
is received by the victim as it is from trusted sources while it is not.
• KCI can cheat the victim by showing the attacker as trusted online
store asking for credit information. KCI lets the attacker to impersonate
trusted wireless connection which tricks the victim.
Before going into details of this vulnerability on one-pass key exchange pro-
tocols, it is important to denote that all public keys are stored in a trusted
directory called Certificate Authority (CA). This means all parties can be au-
thenticated.
Assuming one of the parties’ private key has been compromised by an at-
tacker. In addition to the ability of the attacker to impersonate the attacked
party to others, he can also attack the same party without his knowledge
by masquerading as any other party! For this reason, a resistance to key-
compromise impersonation attack is a must to reduce the damage that may
occur if a private key is disclosed by anyway. Several enhancements are pro-
posed to offer resistance against KCI attacks as in [10] [17] [22][25]
A STUDY ON... 187
Conclusion
In this paper, a survey on key exchange protocols and possible attacks on the
recent ones are presented. We surveyed on secure and efficient key exchange pro-
tocols. We presented a key compromise impersonating attack and an ephemeral
key compromise attack on recent protocols such as one-pass to test the security
resistance factors of each protocol.
References
[1] K. Chalkias, F. Baldimtsi, D. Hristu-Varsakelis and G. Stephanides, Two Types of Key-
Compromise Impersonation Attacks against One-Pass Key Establishment Protocols, in
4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised
Selected Papers, 2009.
[2] W. Diffie and M. Hellman, New directions in cryptography, Information Theory, IEEE
Transactions on, vol. 22, no. 6, pp. 644 - 654, 1976.
[3] W. Stallings, Diffie-Hellman Key Exchange, in Cryptography and Network Security Prin-
ciples and Practice, Pearson Education, 2013, pp. 287-291.
[4] C. G. Günther, An Identity-Based Key-Exchange Protocol, in Advances in Cryptology
— EUROCRYPT 89, Springer Berlin Heidelberg, 1990, pp. 29-37.
[5] E. Okamoto and K. Tanaka, Key distribution system based on identification information,
Selected Areas in Communications, IEEE Journal on , vol. 7, no. 4, pp. 481-485 , 1989.
[6] A. Fiat and A. Shamir, How to prove yourself: practical solutions to identification and
signature problems, in Advances in cryptology—CRYPTO 86, Springer-Verlag London,
1987, pp. 186-194.
[7] W. Diffie, P. C. V. Oorschot and M. J. Wiener, Authentication and authenticated key
exchanges, Designs, Codes and Cryptography , vol. 2, no. 2, pp. 107 - 125 , June 1992 .
[8] M. Just and S. Vaudenay, Authenticated Multi-Party Key Agreement, in ASIACRYPT
’96 Proceedings of the International Conference on the Theory and Applications of Cryp-
tology and Information Security: Advances in Cryptology, 1996.
[9] R. Canetti and H. Krawczyk, Analysis of Key-Exchange Protocols and Their Use for
Building Secure Channels, in International Conference on the Theory and Application of
Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings, 2001.
[10] B. LaMacchia, K. Lauter and A. Mityagin, Stronger security of authenticated key ex-
change, in First International Conference, ProvSec 2007, Wollongong, Australia, Novem-
ber 1-2, 2007. Proceedings, 2007.
[11] R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung, Systematic
Design of Two-Party Authentication Protocols, in Advances in Cryptology — CRYPTO
’91, 1992.
[12] S. Blake-Wilson and A. Menezes, Authenticated Diffie-Hellman Key Agreement Proto-
cols, in SAC ’98 Proceedings of the Selected Areas in Cryptography, Tavares, 1998.
A STUDY ON... 189
[13] C. Boyd, W. Mao and K. G. Paterson, Key Agreement Using Statically Keyed Authen-
ticators, in Applied Cryptography and Network Security, Jakobsson, 2004.
[14] O.-R. P. f. T.-P. A. K. Exchange, One-Round Protocols for Two-Party Authenticated
Key Exchange, in Applied Cryptography and Network Security, Jakobsson, 2004.
[15] L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, An efficient protocol for authen-
ticated Key Agreement, Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119 - 134,
2003.
[16] R. Lu, Z. Cao, R. Su and J. Shao, Pairing-Based Two-Party Authenticated Key Agree-
ment Protocol, 2005,
available: http://eprint.iacr.org/2005/354.
[17] H. Krawczyk, HMQV: a high-performance secure diffie-hellman protocol, in Advances in
Cryptology – CRYPTO 2005: 25th Annual International Cryptology Conference, Santa
Barbara, California, 2005.
[18] S. Blake-Wilson, D. Johnson and A. Menezes, Key agreement protocols and their security
analysis, in Proceedings of the 6th IMA International Conference on Cryptography and
Coding, Darnell, 1997.
[19] R. J. D. M. M. Ankney, The Unified Model, in Contribution to X9F1, 1995.
[20] NIST, 1998.
available: http://csrc.nist.gov/groups/ST/toolkit/documents/skipjack/skipjack.pdf.
[Accessed 2014].
[21] T. Kwon, Authentication and Key Agreement via Memorable Password, contribution to
the IEEE P1363 study group for future PKC standards, 29 July 2000,
available: http://eprint.iacr.org/2000/026. [Accessed 3 11 2014].
[22] R. W. Zhu, X. Tian and D. S. Wong, Enhancing ck-model for key compromise imperson-
ation Resilience and Identity-based Key Exchange, Cryptology ePrint Archive: Report
2005/455, 13 December 2005. [Online]. Available: http://eprint.iacr.org/2005/455. [Ac-
cessed 3 11 2014].
[23] H. Elkamchouchi and M. Eldefrawy, An efficient and confirmed protocol for authenticated
key agreement, in Radio Science Conference, 2008. NRSC 2008. National, Tanta, 2008.
[24] Q. Cheng, G. Han and C. Ma, Analysis of Two Authenticated Key Exchange Protocols,
in Multimedia Information Networking and Security, 2009. MINES ’09. International
Conference on, Hubei, 2009.
[25] J. Kar “Low Cost Scalar Multiplication Algorithms for Constrained Devices”, Interna-
tional Journal of Pure and Applied Mathematics, Vol.102, No.3, pp.579-592, 2015.
[26] M. R Mishra, J. Kar & B. Majhi, “Practical deployment of One-pass key establish-
ment Protocol on Wireless Sensor Networks”, International Journal of Pure and Applied
Mathematics, Vol(100), No-4, pp 531-542, 2015
190