Modelling Time for Authenticated Key Exchange Protocols

被引:0
|
作者
Schwenk, Joerg [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
来源
关键词
Authenticated key agreement; timestamps; provable security; OTP; Kerberos; AGREEMENT; CHANNELS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of time plays an important role in many practically deployed cryptographic protocols, ranging from One-Time-Password (OTP) tokens to the Kerberos protocol. However, time is difficult to model in a Turing machine environment. We propose the first such model, where time is modelled as a global counter T. We argue that this model closely matches several implementations of time in computer environments. The usefulness of the model is shown by giving complexity-theoretic security proofs for OTP protocols and HMQV-like one-round AKE protocols.
引用
收藏
页码:277 / 294
页数:18
相关论文
共 50 条
  • [41] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng R.
    Wang L.
    International Journal of Ad Hoc and Ubiquitous Computing, 2020, 34 (04): : 249 - 257
  • [42] SECURE AND MINIMAL PROTOCOLS FOR AUTHENTICATED KEY DISTRIBUTION
    JANSON, P
    TSUDIK, G
    COMPUTER COMMUNICATIONS, 1995, 18 (09) : 645 - 653
  • [43] Cryptanalysis of simple authenticated key agreement protocols
    Yang, CC
    Chang, TY
    Hwang, MS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08): : 2174 - 2176
  • [44] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [45] Authenticated Key Management Protocols for Internet of Things
    Li, Celia
    Yang, Cungang
    2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, : 126 - 129
  • [46] Secure and minimal protocols for authenticated key distribution
    IBM Zurich Research Lab, Ruschlikon, Switzerland
    Comput Commun, 9 (645-653):
  • [47] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257
  • [48] Deniable authenticated key establishment for Internet protocols
    Boyd, C
    Mao, WB
    Paterson, KG
    SECURITY PROTOCOLS, 2005, 3364 : 255 - 273
  • [49] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [50] Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
    Nam, Junghyun
    Paik, Juryon
    Kim, Ung Mo
    Won, Dongho
    INFORMATION SCIENCES, 2007, 177 (23) : 5441 - 5467