A Mechanized Logic for Secure Key Escrow Protocol Verification

نویسندگان

  • E. Thomas Schubert
  • Sarah Mocas
چکیده

Reasoning about key escrow protocols has increasingly become an important issue. The Escrowed Encryption Standard (EES) has been proposed as a US government standard for the encryption of un-classiied telecommunications. One unique feature of this system is key escrow. The purpose of key escrow is to allow government access to session keys shared by EES devices. We develop a framework to formally specify and verify the correctness of key escrow protocols that we mechanize within the HOL theorem proving system. Our logic closely follows the logic, SVO , used for analyzing cryptographic protocols which was developed by Syverson and vanOorschot 13]. Using the HOL mechanization of SVO , we formally demonstrate the failure of the EES key escrow system by showing that it does not insure that the escrow agent receives correct information. This was previously shown experimentally 2]. Last, we ooer an alternative escrow protocol and demonstrate its correctness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

Cryptanalysis of Sui et al.'s Second ID-based Key Issuing Protocol without Key Escrow

Recently, Sui et al. proposed two separable and anonymous IDbased key issuing protocols without secure channel and claimed that their second protocol avoids the key escrow problem. However, in this paper, impersonation attack is proposed to show that Sui et al.’s second protocol is not free from the key escrow problem. We also show that their protocol cannot detect the able to access of illegit...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Key Generation Protocol in IBC

Identity Based Cryptography (IBC) is well known method in the field of security, however it has an inherent drawback of Key Escrow under which central key generation center is a sole issuing authority of private key and thus could misuse it. Our survey finds numerous solutions of key escrow; out of them secure key issuing protocol (SKIP) is most prominent. However, there are scopes for improvin...

متن کامل

Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems

Key issuing protocols deal with overcoming the two inherent problems: key escrow and secure channel requirement of the identity based cryptosystems. An efficient key issuing protocol enables the identity based cryptosystems to be more acceptable and applicable in the real world. We present a secure and efficient threshold key issuing protocol. In our protocol, neither KGC nor KPA can impersonat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995