On All - or - Nothing Transforms and Password - AuthenticatedKey

نویسندگان

  • Victor Boyko
  • Arthur C. Smith
چکیده

This thesis provides a formal analysis of two kinds of cryptographic objects that used to be treated with much less rigor: All-or-Nothing Transforms (AONTs) and Password-Authenticated Key Exchange protocols. For both, novel formal deenitions of security are given, and then practical and eecient constructions are proven secure. The constructions for password-authenticated key exchange are novel, and the AONT construction is an application of an existing scheme to a new area. AONTs have been proposed by Rivest as a mode of operation for block ciphers. An AONT is an unkeyed, invertible, randomized transformation, with the property that it is hard to invert unless all of the output is known. Applications of AONTs include improving the security and eeciency of encryption. We give several strong formal deenitions of security for AONTs. We then prove that Optimal Asymmetric Encryption Padding (OAEP) satisses these deenitions (in the random oracle model). This is the rst construction of an AONT that has been proven secure in the strong sense. We also show that no AONT can achieve substantially better security than OAEP. The second part of this thesis is about password-authenticated key exchange protocols. We present a new protocol called PAK which is the rst such Diie-Hellman-based protocol to provide a formal proof of security (in the random oracle model) against active adversaries. In addition to the PAK protocol that provides mutual explicit authentication, we also show a more eecient protocol called PPK that is provably secure in the implicit-authentication model. We then extend PAK to a protocol called PAK-X, in which one side (the client) stores a plaintext version of the password, while the other side (the server) only stores a veriier for the password. We formally prove security of PAK-X, even when the server is compromised. Our formal model for password-authenticated key exchange is new, and may be of independent interest.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On all-or-nothing transforms and password-authenticated key exchange protocols

This thesis provides a formal analysis of two kinds of cryptographic objects that used to be treated with much less rigor: All-or-Nothing Transforms (AONTs) and Password-Authenticated Key Exchange protocols. For both, novel formal definitions of security are given, and then practical and efficient constructions are proven secure. The constructions for password-authenticated key exchange are nov...

متن کامل

Something About All or Nothing (Transforms)

In this short note, we study all-or-nothing transforms, which were recently proposed by Rivest as a mode of operation for block ciphers. We study transforms of this type that provide unconditional security. A simple construction for linear transforms is given, and some existence and non-existence results for general transforms are derived from a combinatorial characterization of these objects.

متن کامل

All or Nothing at All

We continue a study of unconditionally secure all-or-nothing transforms (AONT) begun in [12]. An AONT is a bijective mapping that constructs s outputs from s inputs. We consider the security of t inputs, when s − t outputs are known. Previous work concerned the case t = 1; here we consider the problem for general t, focussing on the case t = 2. We investigate constructions of binary matrices fo...

متن کامل

Identification and Key Distribution Based on Biometric Information

Alice y(password) ? f(.) – one way function Important remark: With the use of one-way function it is assumed that " y " is distributed trully randomly. Otherwise – nothing is taken for granted. Defects of this approach: • Good password can be forgotten by Alice, • Storing of password in memory increases the risk of its theft, • Short password can be easy memorized but it can be easy found by ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008