Research Article

Scrutinizing the Vulnerability of Ephemeral Diffie–Hellman over COSE (EDHOC) for IoT Environment Using Formal Approaches

Table 1

Symbols and notations used in the EDHOC protocol.

ComponentsDescription

MethodOne of the four types of authentication methods agreed by the initiator and the responder.
CorrOne of the four types of correlation mechanisms provided by the transport path.
SUITES_I, SUITS_RList of cipher suites (in order of preference) supported by the initiator and the responder, respectively.
x, yThe ECDH ephemeral private keys of the initiator and the responder, respectively.
GX, GYThe ECDH ephemeral public keys of the initiator and the responder, respectively.
pA prime number that states the size of the finite field.
a, bThe coefficients of the elliptic curve equation.
GThe generator (base point) of the subgroup.
h, nThe cofactor and order of the subgroup, respectively.
CI, CRConnection identifiers for the initiator and responder, respectively, that are used to facilitate the retrieval of the protocol state.
ADApplication data (also known as external authorization data).
CREDI, CREDRThe credentials containing the public authentication keys of the initiator and the responder, respectively.
ID_CREDI, ID_CREDRThe identifiers for the credentials CREDI and CREDR, respectively.
THTranscript hashes used for key derivation and additional authenticated data.
KSession key.
PRKPseudorandom key.
PSKPreshared key.
AEAD (K; )Authenticated Encryption with Associated Data using a key K.
Sig (I; . ), Sig(R; . )Digital signatures made with the private authentication key of the initiator and the responder, respectively.