RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2024 Number 66, Pages 60–77 (Mi pdm856)

Mathematical Methods of Cryptography

Forcing future public ephemeral keys to attack authenticated key establishment protocols

E. K. Alekseev, S. N. Kyazhin, S. V. Smyshlyaev

CryptoPro LLC, Moscow, Russia

Abstract: This paper studies the security of the authenticated key establishment protocols against the adversary who has the capability to force the participants to use of ephemeral public values. The paper substantiates the relevance of considering this capability, describes, in particular, attacks on the SIGMA, SIGMA-R, STS-MAC, Echinacea-3 protocols and the post-quantum BKM-KK protocol, and discusses the design features of protocols that allow to protect against attacks of this type.

Keywords: cryptography, cryptographic protocol, authenticated key establishment, attack, forcing public ephemeral keys.

UDC: 004.056

DOI: 10.17223/20710410/66/6



© Steklov Math. Inst. of RAS, 2026