Secure Communications over Insecure Channels Using an Authenticated Channel
نویسندگان
چکیده
A secure peer-to-peer communication over an insecure channel without any prior exchanged key can be established with the help of an authentication step to exchange a public key. Then, standard methods of public-key cryptography such as RSA can be used to communicate securely. In this work, we concentrate on message authentication protocols which require an extra authenticated channel. We start by describing some possible human communications channels, such as telephone, and by analyzing them according to some properties, in particular authentication properties. Then, we recall some message authentication protocols which use an authenticated extra channel. In addition, we recall different types of authentication. For instance, we recall biometrics-based systems which use the ability of humans to recognize the voice of the distant user. We recall also distance bounding-based systems which assumes that there is no other systems in the “integrity area”. In a second step, we prove the maximal security of a message authentication protocol against adversaries and we show that a protocol using k-bit authenticated strings reaches the maximal security when the distribution among all possible authenticated strings is uniform. More precisely, we sketch three generic attacks against any message authentication protocol. Using these results, we study the security of different authentication protocols, either noninteractive or interactive. In addition, we propose a new protocol which achieves the same security level against offline attacks as that of the one used today in many systems, such as SSH or GPG, but using much less authenticated bits. Finally, we compare interactive and non-interactive authentication protocols and we study their usability in different applications.
منابع مشابه
Secure Communications over Insecure Channels Based on Short Authenticated Strings
We propose a way to establish peer-to-peer authenticated communications over an insecure channel by using an extra channel which can authenticate very short strings, e.g. 15 bits. We call this SAS-based authentication as for authentication based on Short Authenticated Strings. The extra channel uses a weak notion of authentication in which strings cannot be forged nor modified, but whose delive...
متن کاملPairing-Based Two-Party Authenticated Key Agreement Protocol
To achieve secure data communications, two parties should be authenticated by each other and agree on a secret session key by exchanging messages over an insecure channel. In this paper, based on the bilinear pairing, we present a new two-party authenticated key agreement protocol, and use the techniques from provable security to examine the security of our protocol within Bellare-Rogaway model.
متن کاملSAS-Based Authenticated Key Agreement
Key agreement protocols are frequently based on the Dif£e-Hellman protocol but require authenticating the protocol messages in two ways. This can be made by a cross-authentication protocol. Such protocols, based on the assumption that a channel which can authenticate short strings is available (SAS-based), have been proposed by Vaudenay. In this paper, we survey existing protocols and we propos...
متن کاملAuthenticated and Secure End-To-End Communication Channel Using SMS Messages
One of the key issues of modern cryptography is the problem of establishing a secure end-to-end communication over an insecure communication channel. Short Message Service (SMS) is a hugely popular and easily adopted communications technology for mobile devices. Users conduct business, disclose passwords and receive sensitive notification reports from systems using this communication technology...
متن کاملInformation Theoretically Secure Encryption with Almost Free Authentication
In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this work, we propose an information theoretically secure direction for the construction of secure channels. First, we propose a method of achieving un...
متن کامل