Computational soundness of Diffie-Hellman key exchange against active attackers

  • Fan Zhang*
  • , Zhoujun Li
  • , Liang Gan
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Significant progress was made in proving that symbolic models offering basic cryptographic operations such as encryption and digital signatures can be sound with respect to actual cryptographic realizations and security definitions. In this paper, we first introduce an extension of the Dolev-Yao algebra that allows protocol designers to express the Diffie-Hellman scheme as part of their protocols. We prove that even in the presence of arbitrary active adversaries, any Dolev-Yao attack that violates the formal version of the Diffie-Hellman assumption maps to a computational algorithm that violates the computational Diffie-Hellman assumption also. This yields the first computational soundness result for Diffie-Hellman key exchange against active adversaries.

Original languageEnglish
Pages (from-to)3507-3512
Number of pages6
JournalInternational Review on Computers and Software
Volume7
Issue number7
StatePublished - 2012

Keywords

  • Computational soundness
  • Diffie-hellman key exchange
  • Symbolic cryptography

Fingerprint

Dive into the research topics of 'Computational soundness of Diffie-Hellman key exchange against active attackers'. Together they form a unique fingerprint.

Cite this