Preview

Joux's Protocol: Common Values And Protocols In The Diffie-Hellman Protocol

Good Essays
Open Document
Open Document
1161 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Joux's Protocol: Common Values And Protocols In The Diffie-Hellman Protocol
(vα)γmod r and (vβ)γmod r. Once the protocol in Figure(2-4) is complete SKA, SKBand
SKCare computed by A, B and C respectively where SKA, SKBand SKCare all equal to SKABC=vαβγmod r. This value can serve as the secret key shared by A, B and C. The values α, β and γ should be deleted at the end of the protocol run.
2.3.3
Joux’s Protocol
Joux[45]proposed a very simple and sophisticated one-round protocol in which the secret session key for three partners could be generated in a single round using three broad- casts. This protocol simplifies the Diffie-Hellman protocol shown in Figure(2-4) and is used to generate a shared secret key with lowest communication complexity. Joux’s protocol makes use of bilinear pairings on elliptic curves and requires
…show more content…
We suppose that A, B and C share the common values (G1,G2, ˆ e), which are deter- mined by the security parameter µ. In Joux’s protocol, U is the generator of the group G1of prime order r, and α,β,γ ∈ Z∗ rare chosen uniformly at random by the three partners. As in the Diffie-Hellman protocol, the ordering of protocol messages is irrelevant and any of the three partners can launch the protocol. The message flows are given in Figure(2-5).
Protocol description: Once the communication in Figure(2-5) is complete, A computes
SKA = ˆe(βU,γU)α, β computes SKB = ˆe(αU,γU)βand C computes SKC =
ˆe(αU,βU)γ.
By bilinearity of ˆ e, SKA, SKB and SKC are all equal to SKABC =
ˆe(U,U)αβγ. This can serve as the secret key shared by A, B and C.
Although not explicitly stated in[45], the success of this protocol in achieving its goal of agreeing a good key for the three partners in the face of passive attackers can be relevant to the hardness of either the BDHP or the DBHDP. As is the case with the two partners Diffie-
Hellman protocol, depending on how the key is extracted the protocol depends on either
…show more content…
2.4.2
Discrete Logarithms and Diffie-Hellman Problems
Since all cryptosystems considered in this thesis based on groups where the discrete logarithm and Diffie-Hellman problems are assumed to be difficult, we start by first recalling their definition. definition 2.4.3 For a security parameter µ ∈ N, let (G,.) be a cyclic group of order r and let v be a generator of G. The discrete logarithm problem (DLP) is, given a random y, to find the unique x ∈ Zrsuch that y = vx.
Although easy in some certain cases (like (Zr,+)), finding the solution to this problem is known to take exponential time. In prime order subgroups G of multiplicative groups
Zr, the commonly used algorithms[46]require sub-exponential time in µ. On subgroups of randomly selected elliptic curves, the commonly used algorithms are exponential and elliptic curves are thus especially concerning for the applying of cryptographic protocols as they enable shorter key sizes for the same security level w.r.t. applications in finite fields Zr.
Yet, except for weaker types of curves like ’anomalous’[47,48]or ’supersingular’ curves, 160- bit elliptic curve public keys provide about the same security as a 1024-bit RSA

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pt1420 Unit 6 Lab Report

    • 288 Words
    • 2 Pages

    Step 8 : Then, place the elements in REM into a square matrix of order 3x3.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Ch. 3: RQs 1 – 8, 10 - 13, and Problems 1 – 4, 6 (include all attributes).…

    • 2322 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    After selecting a protocol best suited comparing the earlier studies relevant on the field, it is required to make an assessment of verification and properly understand in depth about the protocol to develop a suitable algorithm targeting it. Therefore using a suitable experimental environment, the protocol should be simulated under various conditions and…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    3. What is a protocol and why would one be used? Provide an example of a technological protocol or a society-based protocol.…

    • 544 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In relationships, the building of TRUST and understanding between people makes it easier to get things done through effective communication.…

    • 2017 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    AC3) Explain where there are many conflicts or dilemma in relation to sharing information with partners and maintaining…

    • 897 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    protocol paper 1

    • 831 Words
    • 4 Pages

    Recall: In "The problem of evil," James Rachels and Stuart Rachels provider some important point: 1) Pain is not body’s warning system needed, because newborn babies did not deserve inexorable pain; 2) Even If we need evil to appreciate the good, but it is does not explain why there is such an extraordinary amount of evil in this world; 3) The doctrine of original sin was absurd. According to authors, it would be come to a conclusion that a newborn baby did deserve terrible disease. 4) The idea that Free Will Defense is in apparent contradiction to the natural evil in the world. 5) Based on the idea that a world without suffering would be void of the virtues necessary for good moral development. It does not explain the reason that God allowed the Holocaust or isolated cases of extreme cruelty to happen. 6) The theory of moral development does not explain the reason why animals suffering.…

    • 831 Words
    • 4 Pages
    Good Essays
  • Good Essays

    ENGR 271 TESTS 1 3 2

    • 2913 Words
    • 46 Pages

    a) (5 pts) Using the provided crystal diagram on the next page, what is the coordination number ofKBr…

    • 2913 Words
    • 46 Pages
    Good Essays
  • Satisfactory Essays

    Wannsee protocol was a meeting of the most senior government officials of the Nazi Germany. The meeting was held in the Germany capital city, Berlin in the suburbs of Wannsee on January 20th, 1942.the meeting was convened by the director SS-Reichssicherheitshauptamt. The conference was to ensure the cooperation of administrative officials of the different government departments in making sure that a solution to the Jewish question was found. The Jewish question had raised issues on whether the German Jewish in Europe would be deported to Poland and killed the protocol was aimed to allow the Jews to migrate from Europe to Poland. The Holocaust historians wanted the Jews to vacate Germany without force or else they would be deported and murdered…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Overview on Ipsec

    • 2720 Words
    • 11 Pages

    * It can be seen clearly that the Internet has developed with a very high speed in many recent years. In the 80s of last century, the Internet was only used in US army, but nowadays, the Internet has come to every country, every home and everyone. However, such fast develops also go along with the increasing number of security issues from the Internet. Therefore there is a need to find a security solution for this issue and that is the season why Internet Protocol Securities exists.…

    • 2720 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Ip Address Scheme

    • 495 Words
    • 2 Pages

    All binary 1s at the host number means a broadcast to all hosts on that network.…

    • 495 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Organic Chemistry for 11

    • 887 Words
    • 4 Pages

    −HBr CH 3 − CHBr2 + KOH ⎯⎯⎯→ CH 2 = CH − Br (alc.)…

    • 887 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Internet Protocol Journal

    • 17243 Words
    • 69 Pages

    From the Editor .......................1 Peering and Settlements ...........2 Firewalls and Internet Security ..................................24 Was the Melissa Virus So Different? ..........................33 Book Review..........................36 Call for Papers .......................38 Fragments ..............................39…

    • 17243 Words
    • 69 Pages
    Powerful Essays