MQV
From Wikipedia, the free encyclopedia
MQV (Menezes-Qu-Vanstone) is an authenticated protocol for key agreement based on the Diffie-Hellman scheme. Like other authenticated Diffie-Hellman schemes, MQV provides protection against an active attacker. The protocol can be modified to work in an arbitrary finite group, and, in particular, elliptic curve groups, where it is known as elliptic curve MQV (ECMQV).
MQV was initially proposed by Menezes, Qu and Vanstone in 1995. It was modified by Law and Solinas in 1998. There are one-, two- and three-pass variants.
MQV is incorporated in the public-key standard IEEE P1363.
Some variants of MQV are claimed in patents assigned to Certicom [1].
MQV has some (alleged) weaknesses that were (allegedly) fixed by HMQV in 2005 [2], but see [3] for an alternative viewpoint.
ECMQV is also specified by the National Security Agency as part of the "Suite B" set of cryptographic standards for securing US Federal government communications up to the TOP SECRET classification.
[edit] See also
[edit] References
- Burton S. Kaliski Jr., An unknown key-share attack on the MQV key agreement protocol. ACM Trans. Inf. Syst. Secur. 4(3): pp275–288 (2001)
- Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott A. Vanstone, An Efficient Protocol for Authenticated Key Agreement. Des. Codes Cryptography 28(2): pp119–134 (2003)
- Peter J. Leadbitter, Nigel P. Smart: Analysis of the Insecurity of ECMQV with Partially Known Nonces. ISC 2003: pp240–251
- A. Menezes, M. Qu, and S. Vanstone, Some new key agreement protocols providing implicit authentication, Preproceedings of Workshops on Selected Areas in Cryptography (1995).
[edit] External links
- Articles on MQV and ECMQV in Certicom's newsletter Code and Cipher.
- HMQV: A High-Performance Secure Diffie-Hellman Protocol by Hugo Krawczyk
- Another look at HMQV
- An Efficient Protocol for Authenticated Key Agreement
Algorithms: Cramer-Shoup | DH | DSA | ECDH | ECDSA | EKE | ElGamal | GMR | IES | Lamport | MQV | NTRUEncrypt | NTRUSign | Paillier | Rabin | RSA | Schnorr | SPEKE | SRP | XTR |
Theory: Discrete logarithm | Elliptic curve cryptography | RSA problem |
Standardization: ANS X9F1 | CRYPTREC | IEEE P1363 | NESSIE | NSA Suite B Misc: Digital signature | Fingerprint | PKI | Web of trust | Key size |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |