Authenticated Key Exchange. Definitions MAP matching conversations oracles (I)KA AKEP2 AKEP2 Security Session Keys Perfect Forward Secrecy Adversary Attacks. Presented By: Ashley Bruno & Blayne White. Key Establishment Protocols.
Ashley Bruno & Blayne White
(probably no longer fresh)
It is still desirable to design protocols where past
sessions remain secure.
Perfect forward secrecy: compromise of long-term
keys does not compromise past session keys.
“Forward secrecy” indicates that the secrecy of old
keys is carried forward into the future.
A sends a challenge nonce to B.
A responds to the challenge nonce with hk(A,nb) to B
However, all four of these attacks are not considered violations of protocol security!