Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

被引:0
|
作者
Gorantla, M. Choudary [1 ]
Boyd, Colin [1 ]
Gonzalez Nieto, Juan Manuel [1 ]
机构
[1] Queensland Univ Technol, Fac IT, Informat Secur Inst, Brisbane, Qld 4001, Australia
关键词
Group Key Exchange; Key Compromise Impersonation; Insider Attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has, not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks oil these protocols demonstrate the necessity of considering KCI resilience. Finally, we give a new proof of security for all existing GKE protocol under the revised model assuming random oracles.
引用
收藏
页码:105 / 123
页数:19
相关论文
共 50 条
  • [41] Comparative Analysis of Internet Key Exchange Protocols
    Shaheen, Safdar Hussain
    Yousaf, Muhammad
    Majeed, Muhammad Younas
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [42] Security Verification for Authentication and Key Exchange Protocols
    Otat, Haruki
    Kiyomotot, Shinsaku
    Tanakat, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
  • [43] Modelling Time for Authenticated Key Exchange Protocols
    Schwenk, Joerg
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
  • [44] Analysis and modification of the Internet Key Exchange Protocols
    Jianfan Wei Renliang Yuan (Communication
    Navigation and Command Automation Institute of the Air Force Equipment Academy)
    信息安全与通信保密, 2005, (07) : 156 - 159
  • [45] Downgrade Resilience in Key-Exchange Protocols
    Bhargavan, Karthikeyan
    Brzuska, Christina
    Fournet, Cedric
    Green, Matthew
    Kohlweiss, Markulf
    Zanella-Beguelin, Santiago
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 506 - 525
  • [46] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
  • [47] Post-quantum key exchange Protocols
    Li, Xiangdong
    Leung, Lin
    Kwan, Andis Chi-Tung
    Zhang, Xiaowen
    Kahanda, Dammika
    Anshel, Michael
    QUANTUM INFORMATION AND COMPUTATION IV, 2006, 6244
  • [48] Key exchange protocols for multiparty communication services
    Hosei University (Institute of Electrical and Electronics Engineers Inc., United States):
  • [49] SEVERAL PRACTICAL PROTOCOLS FOR AUTHENTICATION AND KEY EXCHANGE
    LIM, CH
    LEE, PJ
    INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 91 - 96
  • [50] Key exchange protocols for multiparty communication services
    Chan, CW
    Chang, CC
    FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 241 - 248