How to detect unauthorised usage of a key
نویسندگان
چکیده
Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device performing the crypto operations is free of malware. We explore ways in which some security guarantees can be achieved even if an attacker has succeeded in obtaining access to all the keys in a device, e.g. by exploiting software vulnerabilities. We develop a new protocol concept that allows the device owner to detect if another party is using the device’s longterm key. We achieve this by making it necessary for uses of the key to be inserted in an append-only log, which the device owner can interrogate. We propose a multi-device messaging protocol that exploits our concept to allow users to detect unauthorised usage of their device keys. We prove the main properties of our protocol using the Tamarin prover. The methods we introduce are not intended to replace existing methods used to keep keys safe (such as hardware devices or careful procedures). Rather, our methods provide a useful and effective additional layer of security.
منابع مشابه
Mitigating private key compromise
Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. This thesis provides research on how to mitigate private key compromise in three different cases. The first c...
متن کاملAn Analysis of Integrity drifts in E-trading Systems
The concealment of unauthorised trading by authorised users can deplete shareholders assets, devastate a company irrevocably and leave executives legally exposed if they have not taken relevant measures to ensure the security and integrity of corporate information resources. Thus, this paper exemplifies the workflow of an e-banking activity, the e-trading, and shows that integrity drifts are a ...
متن کاملAn Inter-banking Auditing Security Solution for Detecting Unauthorised Financial Transactions entered by Authorised Insiders
the more frequently occurring security incidents, suggesting that more security is required for detecting and preventing unauthorised financial transactions entered by authorised users. To address the problem, and based on the observation that all authorised interbanking financial transactions trigger or are triggered by other transactions in a workflow, we have developed a security solution ba...
متن کاملOnline copyright enforcement by Internet Service Providers
The culture of online sharing of information on the Internet extends to unauthorised sharing of copyright content, and is perceived as a major threat to copyright owners and content industries. Enforcement of existing copyright laws is difficult due to the widespread nature of unauthorised sharing. Rights holders have pursued individuals and organisations involved through existing legal channel...
متن کاملIntrusion Detection in Wireless Sensor Network Using Random Sensors by Implementing DES Algorithm
Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, we consider this issue according to heterogeneous WSN models. Furthermore, we consider dete...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015