[13682] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Security of DH key exchange

daemon@ATHENA.MIT.EDU (Jaap-Henk Hoepman)
Fri Jun 20 13:34:56 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: cryptography@metzdowd.com
From: Jaap-Henk Hoepman <jhh@cs.kun.nl>
Date: Fri, 20 Jun 2003 11:02:36 +0200


In practice the following method of exchanging keys using DH is used, to ensure
bit security of the resulting session key. If alice and bob exchange g^a and
g^b, the session key is defined as h(g^{ab}). This is mentioned in many
textbooks, but i can't find a reference to a paper discussing the security of
this in the following sense. If g^a etc. are computed over a field F of order
p, and h hashes F to {0,1}^n, under which conditions is h(g^{ab}) given g^a and
g^b indistinguishable from a randomly selected session key k? (where
indistinguishable would mean that the advantage of the adversary of
distinguishing h(g^{ab}) from k is negligible in _n_).

References to this are much appreciated.

Regards,
Jaap-Henk

-- 
Jaap-Henk Hoepman           |  I've got sunshine in my pockets
Dept. of Computer Science   |  Brought it back to spray the day
University of Nijmegen      |        Gry "Rocket"
(w) www.cs.kun.nl/~jhh      |  (m) jhh@cs.kun.nl
(t) +31 24 36 52710/531532  |  (f) +31 24 3653137


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post