On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness

نویسندگان

  • Michèle Feltz
  • Cas J. F. Cremers
چکیده

State-of-the-art authenticated key exchange (AKE) protocols are proven secure in game-based security models. These models have considerably evolved in strength from the originalBellare-Rogaway model. However, so far only informal impossibility results, which suggestthat no protocol can be secure against stronger adversaries, have been sketched. At the sametime, there are many different security models being used, all of which aim to model thestrongest possible adversary. In this paper we provide the first systematic analysis of thelimits of game-based security models. Our analysis reveals that different security goals can beachieved in different relevant classes of AKE protocols. From our formal impossibility results,we derive strong security models for these protocol classes and give protocols that are securein them. In particular, we analyse the security of AKE protocols in the presence of adversarieswho can perform attacks based on chosen randomness, in which the adversary controls therandomness used in protocol sessions. Protocols that do not modify memory shared amongsessions, which we call stateless protocols, are insecure against chosen-randomness attacks.We propose novel stateful protocols that provide resilience even against this worst caserandomness failure, thereby weakening the security assumptions required on the randomnumber generator.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticated Key Exchange under Bad Randomness

We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks.We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomn...

متن کامل

A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices

emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model

One-round authenticated key exchange (ORKE) is an established research area, with many prominent protocol constructions like HMQV (Krawczyk, CRYPTO 2005) and Naxos (La Macchia et al., ProvSec 2007), and many slightly different, strong security models. Most constructions combine ephemeral and static Diffie-Hellman Key Exchange (DHKE), in a manner often closely tied to the underlying security mod...

متن کامل

Strong authenticated key exchange with auxiliary inputs

Leakage attacks, including various kinds of side-channel attacks, allow an attacker to learn partial information about the internal secrets such as the secret key and the randomness of a cryptographic system. Designing a strong, meaningful, yet achievable security notion to capture practical leakage attacks is one of the primary goals of leakage-resilient cryptography. In this work, we revisit ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014