16.5 SHAMIR'S AUTONOMOUS KEY EXCHANGE

In unpublished work, Adi Shamir proposed a key exchange protocol that depends on the secure exchange of no secret information. The following steps exchange a key between User_ID[i] and User_ID[j]:

0.

p is a (known) prime; ki and kj are the (secret) keys of User_ID[i] and User_ID[j]. It is assumed that 1 = gcd{ki, p − 1} = gcd{kj, p − 1} so that both ki and kj have multiplicative inverses modulo p − 1

image

By Fermat's Little Theorem

image

image

Figure 16.3 Step #1 in Shamir's autonomous key exchange.

  1. User_ID[i] (the initiator) selects a session key X0 and performs the exponentiation

    image

    X1 is transmitted to User_ID[j] (Fig. 16.3).

  2. User_ID[j] performs the exponentiation

    image

    X2 is transmitted to User_ID[i] (Fig. 16.4).

  3. User_ID[i] performs the exponentiation

    image

    X3 is transmitted to User_ID[j] (Fig. 16.5).

  4. User_ID[j] performs the exponentiation

    Proposition 16.2: ...

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.