Click here to flash read.
In this paper we propose a number of KEM-based protocols to establish a
shared secret between two parties, and study their resistance over
unauthenticated channels. This means analyzing the security of the protocol
itself, and its robustness against Man-inthe- Middle attacks. We compare them
with their KEX-based counterparts to highlight the differences that arise
naturally, due to the nature of KEM constructions, in terms of the protocol
itself and the types of attacks that they are subject to. We provide practical
go-to KEM-based protocols instances to migrate to, based on the conditions of
currently-in-use KEX-based protocols.
Click here to read this post out
ID: 301698; Unique Viewers: 0
Voters: 0
Latest Change: July 31, 2023, 7:31 a.m.
Changes:
Dictionaries:
Words:
Spaces:
Comments:
Newcom