Authenticated Key Agreement Protocols: Security Models, Analyses, and Designs. (Protocoles d'échanges de clefs authentifiés : modèles de sécurité, analyses et constructions)

نویسنده

  • Augustin P. Sarr
چکیده

An impressive ratio of the previously proposed key agreement protocols turn outto be insecure when regarded with respect to recent security models. The Canetti–Krawczyk(CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide secu-rity arguments for key agreement protocols. We point out security shades in the (e)CK models,and some practical attacks unconsidered in (e)CK–security arguments. We propose a strongsecurity model which encompasses the eCK one. We propose a complementary analysis of theExponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR)signature schemes, which are the building blocks of the HMQV protocol. On the basis of thisanalysis we show how impersonation and man in the middle attacks can be performed againstthe (C, H)MQV(–C) protocols when some session specific information leakages happen. Wedefine the Full Exponential Challenge Response (FXRC) and Full Dual Exponential ChallengeResponse (FDCR) signature schemes; using these schemes we propose the Fully Hashed MQVprotocol and the Strengthened MQV protocol, which preserve the remarkable performance ofthe (H)MQV protocols and resist the attacks we present. The SMQV and FHMQV proto-cols are particularly suited for distributed implementations wherein a tamper–proof device isused to store long–lived keys, while session keys are used on an untrusted host machine. Insuch settings, the non–idle time computation effort of the device reduces to few non–costlyoperations. The SMQV and FHMQV protocols meet our security definition under the GapDiffie–Hellman assumption and the Random Oracle model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constraints-based Verification of Parameterized Cryptographic Protocols

Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. Although many works have been dedicated to standard protocols like Needham-Schroder very few address the more challenging class of group protocols. We present a synchronous model for group protocols, that generalizes st...

متن کامل

Synthesising Secure APIs

Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing API are not always clear. In this paper, we give a new generic API for managing symmetric keys on a trusted cryptographic device. We state and prove security properties for the API. In particular, our API offers a high level of security even when the host machine is controlled b...

متن کامل

Computationally Sound, Automated Proofs for Security Protocols

Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographi...

متن کامل

Typing Messages for Free in Security Protocols: The Case of Equivalence Properties

Privacy properties such as untraceability, vote secrecy, or anonymity are typically expressed asbehavioural equivalence in a process algebra that models security protocols. In this paper, we study how todecide one particular relation, namely trace equivalence, for an unbounded number of sessions.Our first main contribution is to reduce the search space for attacks. Specifically, we ...

متن کامل

Synthesizing Secure Protocols

We propose a general transformation that maps a protocol secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010