Authenticated Key Agreement Protocols: Security Models, Analyses, and Designs. (Protocoles d'échanges de clefs authentifiés : modèles de sécurité, analyses et constructions)
نویسنده
چکیده
An impressive ratio of the previously proposed key agreement protocols turn outto be insecure when regarded with respect to recent security models. The Canetti–Krawczyk(CK) and extended Canetti–Krawczyk (eCK) security models, are widely used to provide secu-rity arguments for key agreement protocols. We point out security shades in the (e)CK models,and some practical attacks unconsidered in (e)CK–security arguments. We propose a strongsecurity model which encompasses the eCK one. We propose a complementary analysis of theExponential Challenge Response (XRC) and Dual Exponential Challenge Response (DCR)signature schemes, which are the building blocks of the HMQV protocol. On the basis of thisanalysis we show how impersonation and man in the middle attacks can be performed againstthe (C, H)MQV(–C) protocols when some session specific information leakages happen. Wedefine the Full Exponential Challenge Response (FXRC) and Full Dual Exponential ChallengeResponse (FDCR) signature schemes; using these schemes we propose the Fully Hashed MQVprotocol and the Strengthened MQV protocol, which preserve the remarkable performance ofthe (H)MQV protocols and resist the attacks we present. The SMQV and FHMQV proto-cols are particularly suited for distributed implementations wherein a tamper–proof device isused to store long–lived keys, while session keys are used on an untrusted host machine. Insuch settings, the non–idle time computation effort of the device reduces to few non–costlyoperations. The SMQV and FHMQV protocols meet our security definition under the GapDiffie–Hellman assumption and the Random Oracle model.
منابع مشابه
Constraints-based Verification of Parameterized Cryptographic Protocols
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. Although many works have been dedicated to standard protocols like Needham-Schroder very few address the more challenging class of group protocols. We present a synchronous model for group protocols, that generalizes st...
متن کاملSynthesising Secure APIs
Security APIs are used to define the boundary between trusted and untrusted code. The security properties of existing API are not always clear. In this paper, we give a new generic API for managing symmetric keys on a trusted cryptographic device. We state and prove security properties for the API. In particular, our API offers a high level of security even when the host machine is controlled b...
متن کاملComputationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time attacks. The other approach relies on a symbolic model of protocol executions in which cryptographi...
متن کاملTyping Messages for Free in Security Protocols: The Case of Equivalence Properties
Privacy properties such as untraceability, vote secrecy, or anonymity are typically expressed asbehavioural equivalence in a process algebra that models security protocols. In this paper, we study how todecide one particular relation, namely trace equivalence, for an unbounded number of sessions.Our first main contribution is to reduce the search space for attacks. Specifically, we ...
متن کاملSynthesizing Secure Protocols
We propose a general transformation that maps a protocol secure in an extremely weak sense (essentially in a model where no adversary is present) into a protocol that is secure against a fully active adversary which interacts with an unbounded number of protocol sessions, and has absolute control over the network. The transformation works for arbitrary protocols with any number of participants,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010