Deep Random based Key Exchange protocol resisting unlimited MITM
نویسنده
چکیده
We present a protocol enabling two legitimate partners sharing an initial secret to mutually authenticate and to exchange an encryption session key. The opponent is an active Man In The Middle (MITM) with unlimited calculation and storage capacities. The resistance to unlimitedly powered MITM is obtained through the combined use of Deep Random secrecy, formerly introduced [9] and proved as unconditionally secure against passive opponent for key exchange, and universal hash techniques. We prove the resistance to MITM interception attacks, and show that (i) upon successful completion, the protocol leaks no residual information about the current value of the shared secret to the opponent, and (ii) that any unsuccessful completion is detectable by the legitimate partners. We also discuss implementation techniques.
منابع مشابه
An Improved Key Exchange Protocol for WLAN That Can Resist MITM Attack Which Benefit from RTT
By the advancing of microelectronics, we propose an improved version of Aydos’s protocol, which uses the restraint of RTT. The new protocol can resist two types of MITM attack that presented by Mangipudi and Liu. It can even resist the strengthened MITM attack in which the attacker has infinite computing resource. We then analyse the new protocol both theoretical and experimental.
متن کامل“Detecting Man in the Middle Attacks on Ephemeral Diffie-Hellman without Relying on a Public Key Infrastructure in Real-Time Communications”
With the recent revelations about pervasive surveillance on the Internet, there is renewed interest in techniques that protect against passive eavesdropping without relying on a Public Key Infrastructure (PKI). An ephemeral Diffie-Hellman (DH) key agreement can provide such protection, but (without authentication) the exchange is vulnerable to a Man in the Middle (MitM) attack. An example of a ...
متن کاملSecure Communication Using Identity Based Encryption
Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion Detection Systems (IDS). Furthermore, secure connections require a certain key exchange at the ini...
متن کاملChaum’s Protocol for Detecting Man-in-the-middle: Explanation and Discussion
Title of thesis: CHAUM’S PROTOCOL FOR DETECTING MAN-IN-THE-MIDDLE: EXPLANATION AND DISCUSSION William Newton, Master of Computer Science, 2010 Thesis directed by: Dr. Alan T. Sherman Department of Computer Science In this research paper, I explain David Chaum’s patent that describes the Man-In-The-Middle (MITM) detection protocol. The MITM Detection Protocol (MDP) uses three stages to entrap an...
متن کاملNetwork Working Group the Advanced Encryption Standard-cipher-based Message Authentication Code-pseudo-random Function-128 (aes-cmac-prf-128) Algorithm for the Internet Key Exchange Protocol (ike)
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1801.01456 شماره
صفحات -
تاریخ انتشار 2017