Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

被引:0
|
作者
Gorantla, M. Choudary [1 ]
Boyd, Colin [1 ]
Gonzalez Nieto, Juan Manuel [1 ]
机构
[1] Queensland Univ Technol, Fac IT, Informat Secur Inst, Brisbane, Qld 4001, Australia
关键词
Group Key Exchange; Key Compromise Impersonation; Insider Attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has, not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks oil these protocols demonstrate the necessity of considering KCI resilience. Finally, we give a new proof of security for all existing GKE protocol under the revised model assuming random oracles.
引用
收藏
页码:105 / 123
页数:19
相关论文
共 50 条
  • [31] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    Inam ul haq
    Jian Wang
    Youwen Zhu
    Saad Maqbool
    Digital Communications and Networks, 2021, 7 (01) : 140 - 150
  • [32] Comparison of group key establishment protocols
    Sahin, Serap
    Aslanoglu, Rabia
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (01) : 46 - 57
  • [33] On the performance of group key agreement protocols
    Amir, Yair
    Kim, Yongdae
    Nita-Rotaru, Cristina
    Tsudik, Gene
    ACM Transactions on Information and System Security, 2004, 7 (03) : 457 - 488
  • [34] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    ul Haq, Inam
    Wang, Jian
    Zhu, Youwen
    Maqbool, Saad
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (01) : 140 - 150
  • [35] Improved Attacks Against Key Reuse in Learning with Errors Key Exchange
    Bindel, Nina
    Stebila, Douglas
    Veitch, Shannon
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2021, 2021, 12912 : 168 - 188
  • [36] Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
    Manulis, Mark
    Suzuki, Koutarou
    Ustaoglu, Berkant
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 101 - 110
  • [37] A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols
    Kreuzer, M.
    Myasnikov, A. D.
    Ushakov, A.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 37 - 43
  • [38] Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
    Manulis, Mark
    Suzuki, Koutarou
    Ustaoglu, Berkant
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 16 - +
  • [39] Group Diffie-Hellman key exchange secure against dictionary attacks
    Bresson, E
    Chevassut, O
    Pointcheval, D
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 497 - 514
  • [40] Attacks on Improved Key Distribution Protocols with Perfect Reparability
    Phan, Raphael C. -W.
    Goi, Bok-Min
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 595 - +