메뉴 건너뛰기




Volumn 7417 LNCS, Issue , 2012, Pages 273-293

On the security of TLS-DHE in the standard model

Author keywords

authenticated key exchange; ephemeral Diffie Hellman; provable security; SSL; TLS

Indexed keywords

AUTHENTICATED KEY EXCHANGE; DIFFIE HELLMAN; PROVABLE SECURITY; SSL; TLS;

EID: 84865461888     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32009-5_17     Document Type: Conference Paper
Times cited : (154)

References (24)
  • 1
    • 84937579774 scopus 로고    scopus 로고
    • The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
    • Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
    • Abdalla, M., Bellare, M., Rogaway, P.: The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 143-158. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2020 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 33746041431 scopus 로고    scopus 로고
    • The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and their Security Analysis
    • Darnell, M. (ed.) Cryptography and Coding 1997. Springer, Heidelberg
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 7
    • 84957693225 scopus 로고    scopus 로고
    • Chosen Ciphertext Attacks against Protocols Based on the RSA Encryption Standard PKCS #1
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Bleichenbacher, D.: Chosen Ciphertext Attacks against Protocols Based on the RSA Encryption Standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1-12. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 1-12
    • Bleichenbacher, D.1
  • 8
    • 84865510770 scopus 로고    scopus 로고
    • Less is more: Relaxed yet composable security notions for key exchange
    • ePrint Archive, Report 2012/242
    • Brzuska, C., Fischlin, M., Smart, N.P., Warinschi, B., Williams, S.: Less is more: Relaxed yet composable security notions for key exchange. Cryptology ePrint Archive, Report 2012/242 (2012), http://eprint.iacr.org/
    • (2012) Cryptology
    • Brzuska, C.1    Fischlin, M.2    Smart, N.P.3    Warinschi, B.4    Williams, S.5
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press October
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145. IEEE Computer Society Press (October 2001)
    • (2001) 42nd Annual Symposium on Foundations of Computer Science , pp. 136-145
    • Canetti, R.1
  • 10
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 11
    • 84869635960 scopus 로고    scopus 로고
    • Security Analysis of IKE's Signature-Based Key-Exchange Protocol
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 143-161. Springer, Heidelberg (2002), http://eprint.iacr.org/2002/120/
    • (2002) LNCS , vol.2442 , pp. 143-161
    • Canetti, R.1    Krawczyk, H.2
  • 12
    • 33646805409 scopus 로고    scopus 로고
    • Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
    • Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 13
    • 68849108882 scopus 로고    scopus 로고
    • Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
    • Cremers, C.J.F.: Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 20-33. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5536 , pp. 20-33
    • Cremers, C.J.F.1
  • 14
    • 0003956839 scopus 로고    scopus 로고
    • Version 1.0. RFC 2246 (Proposed Standard) January Obsoleted by RFC 4346, updated by RFCs 3546, 5746
    • Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard) (January 1999); Obsoleted by RFC 4346, updated by RFCs 3546, 5746
    • (1999) The TLS Protocol
    • Dierks, T.1    Allen, C.2
  • 15
    • 33847753565 scopus 로고    scopus 로고
    • Version 1.1. RFC 4346 (Proposed Standard) April Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746
    • Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard) (April 2006); Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746
    • (2006) The Transport Layer Security (TLS) Protocol
    • Dierks, T.1    Rescorla, E.2
  • 17
    • 57049104588 scopus 로고    scopus 로고
    • Universally Composable Security Analysis of TLS
    • Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. Springer, Heidelberg
    • Gajek, S., Manulis, M., Pereira, O., Sadeghi, A.-R., Schwenk, J.: Universally Composable Security Analysis of TLS. In: Baek, J., Bao, F., Chen, K., Lai, X. (eds.) ProvSec 2008. LNCS, vol. 5324, pp. 313-327. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5324 , pp. 313-327
    • Gajek, S.1    Manulis, M.2    Pereira, O.3    Sadeghi, A.-R.4    Schwenk, J.5
  • 18
    • 84899441715 scopus 로고    scopus 로고
    • On the security of TLS-DHE in the Standard Model (full version)
    • ePrint Archive, Report 2011/219 (revised 2012)
    • Jager, T., Kohlar, F., Schäge, S., Schwenk, J.: On the security of TLS-DHE in the Standard Model (full version). Cryptology ePrint Archive, Report 2011/219 (2011) (revised 2012), http://eprint.iacr.org/2011/219
    • (2011) Cryptology
    • Jager, T.1    Kohlar, F.2    Schäge, S.3    Schwenk, J.4
  • 19
    • 38149012093 scopus 로고    scopus 로고
    • Stronger Security of Authenticated Key Exchange
    • Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
    • LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger Security of Authenticated Key Exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4784 , pp. 1-16
    • LaMacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 20
    • 58349099301 scopus 로고    scopus 로고
    • A Modular Security Analysis of the TLS Handshake Protocol
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Morrissey, P., Smart, N.P., Warinschi, B.: A Modular Security Analysis of the TLS Handshake Protocol. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 55-73. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 55-73
    • Morrissey, P.1    Smart, N.P.2    Warinschi, B.3
  • 21
    • 73849111632 scopus 로고    scopus 로고
    • The TLS Handshake protocol: A modular analysis
    • Morrissey, P., Smart, N.P.,Warinschi, B.: The TLS Handshake protocol: A modular analysis. Journal of Cryptology 23(2), 187-223 (2010)
    • (2010) Journal of Cryptology , vol.23 , Issue.2 , pp. 187-223
    • Morrissey, P.1    Smart, N.P.2    Warinschi, B.3
  • 22
    • 82955189836 scopus 로고    scopus 로고
    • Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • Paterson, K.G., Ristenpart, T., Shrimpton, T.: Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 372-389. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 372-389
    • Paterson, K.G.1    Ristenpart, T.2    Shrimpton, T.3
  • 23
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • ePrint Archive, Report 2004/332 November
    • Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive, Report 2004/332 (November 2004)
    • (2004) Cryptology
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.