Please use this identifier to cite or link to this item:
Title: Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
Authors: Menezes, Alfred
Ustaoğlu, Berkant
Keywords: Network protocols
Key agreement protocols
NIST SP 800-56A
Provable security
Security model
Issue Date: 2008
Publisher: Association for Computing Machinery (ACM)
Source: Menezes, A., and Ustaoğlu, B. (2008, March). Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Paper presented at the Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan (261-270). New York, N.Y. : ACM Press.
Abstract: The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 800-56A standard. The UM protocol is believed to possess all important security attributes including key authentication and secrecy, resistance to unknown key-share attacks, forward secrecy, resistance to known-session key attacks, and resistance to leakage of ephemeral private keys, but is known to succumb to key-compromise impersonation attacks. In this paper we present a strengthening of the Canetti-Krawczyk security definition for key agreement that captures resistance to all important attacks that have been identified in the literature with the exception of key-compromise impersonation attacks. We then present a reductionist security proof that the UM protocol satisfies this new definition in the random oracle model under the Gap Diffie-Hellman assumption. Copyright 2008 ACM.
Description: ACM Symposium on Information, Computer and Communications Security, ASIACCS '08; Tokyo; Japan; 18 March 2008 through 20 March 2008
ISBN: 9781595939791
Appears in Collections:Mathematics / Matematik
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection

Files in This Item:
File Description SizeFormat 
4770.pdfConference Paper298.9 kBAdobe PDFThumbnail
Show full item record

CORE Recommender


checked on Mar 18, 2023

Page view(s)

checked on Mar 20, 2023


checked on Mar 20, 2023

Google ScholarTM



Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.