Recovering Keys in Open Networks

نویسنده

  • Guillaume Poupard
چکیده

| In recent years, key recovery has been the subject of a lot of discussion, of much controversy and of extensive research. The widespread opinion of the research community, expressed in a technical report 13], written by well known experts, is that large-scale deployment of a key recovery system is essentially impossible. Despite this fact, key recovery might be needed at a corporate level, as a form of key management. The basic observation of the present paper is that cryptographic solutions that have been proposed so far, completely ignore the communication context. Surprisingly, static systems are put forward for key recovery at network layer and solutions that require connections with a server are proposed at application layer. We give two examples showing that it is possible to take advantage of the communication environment in order to design key recovery protocols that are better suited and more eecient. I. Introduction In recent years, key recovery has been the subject of a lot of discussion, of much controversy and of extensive research, fostered by the rapid development of worldwide networks such as the Internet. A quick deenition of a large-scale public key infrastructure is required in order to manage signature keys and to allow secure encryption. However, a completely liberal use of cryptography is not completely accepted by governments and companies so that escrowing mechanisms need to be developed in order to fullll current regulations. Because of the technical complexity of this problem, many rather unsatisfactory proposals have been published. Some of them are based on tamper-resistant hardware, others make extensive use of trusted third parties. Furthermore, most of them notably increase the number of messages exchanged by the various parties , as well as the size of the communications. Based on these reasons, the widespread opinion of the research community, expressed in a technical report 13], written by well known experts , is that large-scale deployment of a key recovery system is still beyond the current competency of cryptography. Despite this fact, key recovery might be needed at a corporate level, as a form of key management. The basic observation of the present paper is that cryptographic solutions that have been proposed so far, completely ignore the communication context. Surprisingly, static systems are put forward for key recovery at network layer and solutions that require connections with a server are proposed at application layer. We give two examples showing that it …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Storing Private Keys in the Cloud

Many future applications, such as distributed social networks, will rely on public-key cryptography, and users will want to access them from many locations. Currently, there is no way to store private keys in the cloud without placing complete faith in a centralised operator. We propose a protocol that can be used to share secrets such as private keys among several key recovery agents, using a ...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data

We discuss how to recover RSA secret keys from noisy analog data obtained through physical attacks such as cold boot and side channel attacks. Many studies have focused on recovering correct secret keys from noisy binary data. Obtaining noisy binary keys typically involves first observing the analog data and then obtaining the binary data through quantization process that discards much informat...

متن کامل

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

متن کامل

A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol

Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas. Recently Chang and Chang proposed a novel three party simple key exchange protocol and claimed the protocol is secure, efficient and practical. Unless their claim, a key recovery attack is proposed on the above protocol by recovering the ephemeral keys. One way of recoverin...

متن کامل

Achieving Agility in Disaster Management

A significant body of social science research has concluded that improvisation in distributed, collaborative, open systems is the key to success in responding to and recovering from extreme events. The evolution of emergency management in the United States since the 9-11 attacks has emphasized the development of doctrine, process, and structure. In earlier work I concluded that both the agility...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999