On the resilience of key agreement protocols to key compromise impersonation

被引:0
|
作者
Strangio, Maurizio Adriano [1 ]
机构
[1] Univ Roma Tor Vergata, Rome, Italy
来源
关键词
key compromise impersonation; key agreement protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper focuses on key agreement protocols in the asymmetric trust model, wherein parties hold a public/private key pair. In particular, we consider a type of known key attack called key compromise impersonation that may occur once the adversary has obtained the private key of an honest party. This attack represents a subtle threat that is often underestimated and difficult to counter. Several protocols are shown vulnerable to this attack despite their authors. claiming the opposite. We also consider in more detail how three formal (complexity-theoretic based) models of distributed computing found in the literature cover such attacks.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 50 条
  • [41] Tripartite authenticated key agreement protocols from pairings
    Al-Riyami, SS
    Paterson, KG
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359
  • [42] New key agreement protocols in braid group cryptography
    Anshel, I
    Anshel, M
    Fisher, B
    Goldfeld, D
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 13 - 27
  • [43] A Survey of Authenticated Key Agreement Protocols for Securing IoT
    Mohammad, Zeyad
    Abusukhon, Ahmad
    Abu Qattam, Thaer
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 425 - 430
  • [44] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [45] Key agreement protocols and their security analysis (Extended abstract)
    Blake-Wilson, S
    Johnson, D
    Menezes, A
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 30 - 45
  • [46] New secure explicitly authenticated key agreement protocols
    Abouelseoud, Y.
    Nabil, M.
    IAENG TRANSACTIONS ON ENGINEERING SCIENCES, 2014, : 357 - 368
  • [47] Vulnerability of two multiple-key agreement protocols
    Farash, Mohammad Sabzinejad
    Bayat, Majid
    Attari, Mahmoud Ahmadian
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 199 - 204
  • [48] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [49] A Survey of Group Key Agreement Protocols with Constant Rounds
    Xiong, Hu
    Wu, Yan
    Lu, Zhenyu
    ACM COMPUTING SURVEYS, 2019, 52 (03)
  • [50] Certificate-Based Authenticated Key Agreement Protocols
    Nabil, Mohamed
    Abouelseoud, Yasmine
    Elkobrosy, Galal
    Abdelrazek, Amr
    2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,