On the cryptographic properties of “Limonnik-3” AKE scheme
We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the “Echinacea” family of protocols. The protocol use...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2019-06-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/1182 |
_version_ | 1797725291495292928 |
---|---|
author | Sergey V. Grebnev |
author_facet | Sergey V. Grebnev |
author_sort | Sergey V. Grebnev |
collection | DOAJ |
description | We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the “Echinacea” family of protocols. The protocol uses standardized cryptographic solutions, but does not require digital signature as a primitive, allows two parties to use distinct elliptic curves. The paper describes the protocol the “Limonnik-3”, studies its design rationale, basic requirements used at the stage of protocol design, its cryptographic properties and efficiency. Provided that proposed in the paper parameters and algorithms are used, security against known classes of attacks, including secret key recovery, reduced to the elliptic curve discrete logarithm problem, KCI- and UKS-attacks, is demonstrated. A formal security proof in a modified Canetti-Krawczyk model is deduced, provided that the gap decision Diffie-Hellman problem, connected to the discrete logarithm in the group of points of an elliptic curve, is computationally hard. Automated verification of the protocols shows its security and absence of possible vectors of attack. A brief overview of post-quantum prospectives of the protocol is given. Thus, the paper shows that “Limonnik-3” is a robust and secure cryptographic solution, which satisfies all of the requirements that apply to the modern key exchange protocols. |
first_indexed | 2024-03-12T10:29:04Z |
format | Article |
id | doaj.art-b451a62294e94331932e5a39060923f0 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T10:29:04Z |
publishDate | 2019-06-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-b451a62294e94331932e5a39060923f02023-09-02T09:23:21ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362019-06-0126262010.26583/bit.2019.2.011138On the cryptographic properties of “Limonnik-3” AKE schemeSergey V. Grebnev0Moscow Tikhonov Institute of Electronics and MathematicsWe study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the “Echinacea” family of protocols. The protocol uses standardized cryptographic solutions, but does not require digital signature as a primitive, allows two parties to use distinct elliptic curves. The paper describes the protocol the “Limonnik-3”, studies its design rationale, basic requirements used at the stage of protocol design, its cryptographic properties and efficiency. Provided that proposed in the paper parameters and algorithms are used, security against known classes of attacks, including secret key recovery, reduced to the elliptic curve discrete logarithm problem, KCI- and UKS-attacks, is demonstrated. A formal security proof in a modified Canetti-Krawczyk model is deduced, provided that the gap decision Diffie-Hellman problem, connected to the discrete logarithm in the group of points of an elliptic curve, is computationally hard. Automated verification of the protocols shows its security and absence of possible vectors of attack. A brief overview of post-quantum prospectives of the protocol is given. Thus, the paper shows that “Limonnik-3” is a robust and secure cryptographic solution, which satisfies all of the requirements that apply to the modern key exchange protocols.https://bit.mephi.ru/index.php/bit/article/view/1182authentication, Canetti-Krawczyk model, cryptographic protocol, Diffie-Hellman scheme, elliptic curves, key exchange, MTI/A0 protocol. |
spellingShingle | Sergey V. Grebnev On the cryptographic properties of “Limonnik-3” AKE scheme Безопасность информационных технологий authentication, Canetti-Krawczyk model, cryptographic protocol, Diffie-Hellman scheme, elliptic curves, key exchange, MTI/A0 protocol. |
title | On the cryptographic properties of “Limonnik-3” AKE scheme |
title_full | On the cryptographic properties of “Limonnik-3” AKE scheme |
title_fullStr | On the cryptographic properties of “Limonnik-3” AKE scheme |
title_full_unstemmed | On the cryptographic properties of “Limonnik-3” AKE scheme |
title_short | On the cryptographic properties of “Limonnik-3” AKE scheme |
title_sort | on the cryptographic properties of limonnik 3 ake scheme |
topic | authentication, Canetti-Krawczyk model, cryptographic protocol, Diffie-Hellman scheme, elliptic curves, key exchange, MTI/A0 protocol. |
url | https://bit.mephi.ru/index.php/bit/article/view/1182 |
work_keys_str_mv | AT sergeyvgrebnev onthecryptographicpropertiesoflimonnik3akescheme |