On All - or - Nothing Transforms and Password - AuthenticatedKey
نویسندگان
چکیده
This thesis provides a formal analysis of two kinds of cryptographic objects that used to be treated with much less rigor: All-or-Nothing Transforms (AONTs) and Password-Authenticated Key Exchange protocols. For both, novel formal deenitions of security are given, and then practical and eecient constructions are proven secure. The constructions for password-authenticated key exchange are novel, and the AONT construction is an application of an existing scheme to a new area. AONTs have been proposed by Rivest as a mode of operation for block ciphers. An AONT is an unkeyed, invertible, randomized transformation, with the property that it is hard to invert unless all of the output is known. Applications of AONTs include improving the security and eeciency of encryption. We give several strong formal deenitions of security for AONTs. We then prove that Optimal Asymmetric Encryption Padding (OAEP) satisses these deenitions (in the random oracle model). This is the rst construction of an AONT that has been proven secure in the strong sense. We also show that no AONT can achieve substantially better security than OAEP. The second part of this thesis is about password-authenticated key exchange protocols. We present a new protocol called PAK which is the rst such Diie-Hellman-based protocol to provide a formal proof of security (in the random oracle model) against active adversaries. In addition to the PAK protocol that provides mutual explicit authentication, we also show a more eecient protocol called PPK that is provably secure in the implicit-authentication model. We then extend PAK to a protocol called PAK-X, in which one side (the client) stores a plaintext version of the password, while the other side (the server) only stores a veriier for the password. We formally prove security of PAK-X, even when the server is compromised. Our formal model for password-authenticated key exchange is new, and may be of independent interest.
منابع مشابه
On all-or-nothing transforms and password-authenticated key exchange protocols
This thesis provides a formal analysis of two kinds of cryptographic objects that used to be treated with much less rigor: All-or-Nothing Transforms (AONTs) and Password-Authenticated Key Exchange protocols. For both, novel formal definitions of security are given, and then practical and efficient constructions are proven secure. The constructions for password-authenticated key exchange are nov...
متن کاملSomething About All or Nothing (Transforms)
In this short note, we study all-or-nothing transforms, which were recently proposed by Rivest as a mode of operation for block ciphers. We study transforms of this type that provide unconditional security. A simple construction for linear transforms is given, and some existence and non-existence results for general transforms are derived from a combinatorial characterization of these objects.
متن کاملAll or Nothing at All
We continue a study of unconditionally secure all-or-nothing transforms (AONT) begun in [12]. An AONT is a bijective mapping that constructs s outputs from s inputs. We consider the security of t inputs, when s − t outputs are known. Previous work concerned the case t = 1; here we consider the problem for general t, focussing on the case t = 2. We investigate constructions of binary matrices fo...
متن کاملIdentification and Key Distribution Based on Biometric Information
Alice y(password) ? f(.) – one way function Important remark: With the use of one-way function it is assumed that " y " is distributed trully randomly. Otherwise – nothing is taken for granted. Defects of this approach: • Good password can be forgotten by Alice, • Storing of password in memory increases the risk of its theft, • Short password can be easy memorized but it can be easy found by ad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008