Compact and Efficient Leakage-Resilient Authenticated Key Exchange Protocol
نویسندگان
چکیده
Let us consider the following situation: (1) a user remembers only one password and has some insecure devices with built-in memory while maintaining its connections with many different servers; (2) the counterpart servers are not perfectly secure against possible attacks (e.g., virus or hacker); (3) neither PKI (Public Key Infrastructures) nor TRM (Tamper-Resistant Modules) is available at all. As a currentlyknown solution to the above situation, Shin et al., [1] have proposed a Leakage-Resilient Authenticated Key Exchange (for short, LR-AKE) protocol whose authenticity is based on a user’s password and his/her stored secrets. In this paper, we improve the LR-AKE protocol to be more compact and efficient in aspects of both computation costs and memory size: about 100% decrease of computation costs in the initialization phase and about 96% reduction in memory size. In addition to that, we give a significant countermeasure for minimizing the damage caused by simultaneous leakage of stored secrets from user’s device and server’s database. We also discuss its security under the notion of LRAKE security which ensures enhancement of the overall security level and usability of passwords.
منابع مشابه
New Approach to Practical Leakage-Resilient Public-Key Cryptography
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To this end, we introduce a new primitive called leakage-resilient non-interactive key exchange (LR-NIKE) protocol. We introduce a generic security mod...
متن کاملModelling After-the-fact Leakage for Key Exchange (full Version)
Security models for two-party authenticated key exchange (AKE) protocols have developed over timeto prove the security of AKE protocols even when the adversary learns certain secret values. In this work,we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after thesession key is established. We introduce a generic key exchange secur...
متن کاملOn the leakage-resilient key exchange
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol,which authenticates the communicating parties based on long-term public keys and establishes secretsession keys. In this paper we address the partial leakage of long-term secret keys of key exchangeprotocol participants due to various side-channel attacks. Security models for two-party authe...
متن کاملStrongly Leakage-Resilient Authenticated Key Exchange
Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in real...
متن کاملLeakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model
Authenticated key exchange (AKE) protocols allow two parties communicating over an insecure network to establish a common secret key. They are among the most widely used cryptographic protocols in practice. In order to resist key-leakage attacks, several leakage resilient AKE protocols have been proposed recently in the bounded leakage model. In this paper, we initiate the study on leakage resi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005