How to detect unauthorised usage of a key

نویسندگان

  • Jiangshan Yu
  • Mark Ryan
  • Cas J. F. Cremers
چکیده

Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device performing the crypto operations is free of malware. We explore ways in which some security guarantees can be achieved even if an attacker has succeeded in obtaining access to all the keys in a device, e.g. by exploiting software vulnerabilities. We develop a new protocol concept that allows the device owner to detect if another party is using the device’s longterm key. We achieve this by making it necessary for uses of the key to be inserted in an append-only log, which the device owner can interrogate. We propose a multi-device messaging protocol that exploits our concept to allow users to detect unauthorised usage of their device keys. We prove the main properties of our protocol using the Tamarin prover. The methods we introduce are not intended to replace existing methods used to keep keys safe (such as hardware devices or careful procedures). Rather, our methods provide a useful and effective additional layer of security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating private key compromise

Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. This thesis provides research on how to mitigate private key compromise in three different cases. The first c...

متن کامل

An Analysis of Integrity drifts in E-trading Systems

The concealment of unauthorised trading by authorised users can deplete shareholders assets, devastate a company irrevocably and leave executives legally exposed if they have not taken relevant measures to ensure the security and integrity of corporate information resources. Thus, this paper exemplifies the workflow of an e-banking activity, the e-trading, and shows that integrity drifts are a ...

متن کامل

An Inter-banking Auditing Security Solution for Detecting Unauthorised Financial Transactions entered by Authorised Insiders

the more frequently occurring security incidents, suggesting that more security is required for detecting and preventing unauthorised financial transactions entered by authorised users. To address the problem, and based on the observation that all authorised interbanking financial transactions trigger or are triggered by other transactions in a workflow, we have developed a security solution ba...

متن کامل

Online copyright enforcement by Internet Service Providers

The culture of online sharing of information on the Internet extends to unauthorised sharing of copyright content, and is perceived as a major threat to copyright owners and content industries. Enforcement of existing copyright laws is difficult due to the widespread nature of unauthorised sharing. Rights holders have pursued individuals and organisations involved through existing legal channel...

متن کامل

Intrusion Detection in Wireless Sensor Network Using Random Sensors by Implementing DES Algorithm

Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider dete...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015