Post-Quantum Security of Encrypted Key Exchange Protocol

The Encrypted Key Exchange (EKE) protocol combines the asymmetric and symmetric encryption algorithms to ensure two parties sharing a secret key. Here the authors analyze the post-quantum security of the EKE protocol. Suppose two participants Alice and Bob preshare a password P, they want to establish a secret key m by the using of EKE protocol. They investigate the post-quantum security of the Encrypted Key Exchange (EKE) protocol based on some basic physical paraments, and show that the EKE protocol with a 64 bits password will be secure against a quantum adversary.

Provided by: Chinese Academy of Sciences Topic: Security Date Added: May 2013 Format: PDF

Find By Topic