On the cryptographic properties of “Limonnik-3” AKE scheme

We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the “Echinacea” family of protocols. The protocol use...

Full description

Bibliographic Details
Main Author: Sergey V. Grebnev
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2019-06-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/1182
_version_ 1797725291495292928
author Sergey V. Grebnev
author_facet Sergey V. Grebnev
author_sort Sergey V. Grebnev
collection DOAJ
description We study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the “Echinacea” family of protocols. The protocol uses standardized cryptographic solutions, but does not require digital signature as a primitive, allows two parties to use distinct elliptic curves. The paper describes the protocol the “Limonnik-3”, studies its design rationale, basic requirements used at the stage of protocol design, its cryptographic properties and efficiency. Provided that proposed in the paper parameters and algorithms are used, security against known classes of attacks, including secret key recovery, reduced to the elliptic curve discrete logarithm problem, KCI- and UKS-attacks, is demonstrated. A formal security proof in a modified Canetti-Krawczyk model is deduced, provided that the gap decision Diffie-Hellman problem, connected to the discrete logarithm in the group of points of an elliptic curve, is computationally hard. Automated verification of the protocols shows its security and absence of possible vectors of attack. A brief overview of post-quantum prospectives of the protocol is given. Thus, the paper shows that “Limonnik-3” is a robust and secure cryptographic solution, which satisfies all of the requirements that apply to the modern key exchange protocols.
first_indexed 2024-03-12T10:29:04Z
format Article
id doaj.art-b451a62294e94331932e5a39060923f0
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T10:29:04Z
publishDate 2019-06-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-b451a62294e94331932e5a39060923f02023-09-02T09:23:21ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362019-06-0126262010.26583/bit.2019.2.011138On the cryptographic properties of “Limonnik-3” AKE schemeSergey V. Grebnev0Moscow Tikhonov Institute of Electronics and MathematicsWe study the “Limonnik-3” authenticated key exchange protocol which is a part of Standardization recommendations R 1323565.1.004-2017 “Authenticated key agreement schemes based on public keys”, officially adopted in Russia in 2017, alongside with the “Echinacea” family of protocols. The protocol uses standardized cryptographic solutions, but does not require digital signature as a primitive, allows two parties to use distinct elliptic curves. The paper describes the protocol the “Limonnik-3”, studies its design rationale, basic requirements used at the stage of protocol design, its cryptographic properties and efficiency. Provided that proposed in the paper parameters and algorithms are used, security against known classes of attacks, including secret key recovery, reduced to the elliptic curve discrete logarithm problem, KCI- and UKS-attacks, is demonstrated. A formal security proof in a modified Canetti-Krawczyk model is deduced, provided that the gap decision Diffie-Hellman problem, connected to the discrete logarithm in the group of points of an elliptic curve, is computationally hard. Automated verification of the protocols shows its security and absence of possible vectors of attack. A brief overview of post-quantum prospectives of the protocol is given. Thus, the paper shows that “Limonnik-3” is a robust and secure cryptographic solution, which satisfies all of the requirements that apply to the modern key exchange protocols.https://bit.mephi.ru/index.php/bit/article/view/1182authentication, Canetti-Krawczyk model, cryptographic protocol, Diffie-Hellman scheme, elliptic curves, key exchange, MTI/A0 protocol.
spellingShingle Sergey V. Grebnev
On the cryptographic properties of “Limonnik-3” AKE scheme
Безопасность информационных технологий
authentication, Canetti-Krawczyk model, cryptographic protocol, Diffie-Hellman scheme, elliptic curves, key exchange, MTI/A0 protocol.
title On the cryptographic properties of “Limonnik-3” AKE scheme
title_full On the cryptographic properties of “Limonnik-3” AKE scheme
title_fullStr On the cryptographic properties of “Limonnik-3” AKE scheme
title_full_unstemmed On the cryptographic properties of “Limonnik-3” AKE scheme
title_short On the cryptographic properties of “Limonnik-3” AKE scheme
title_sort on the cryptographic properties of limonnik 3 ake scheme
topic authentication, Canetti-Krawczyk model, cryptographic protocol, Diffie-Hellman scheme, elliptic curves, key exchange, MTI/A0 protocol.
url https://bit.mephi.ru/index.php/bit/article/view/1182
work_keys_str_mv AT sergeyvgrebnev onthecryptographicpropertiesoflimonnik3akescheme