Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, & Practical Key Management

被引:0
|
作者
Nair, Vivek [1 ]
Song, Dawn [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
来源
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM | 2023年
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present the first general construction of a Multi-Factor Key Derivation Function (MFKDF). Our function expands upon password-based key derivation functions (PBKDFs) with support for using other popular authentication factors like TOTP, HOTP, and hardware tokens in the key derivation process. In doing so, it provides an exponential security improvement over PBKDFs with less than 12 ms of additional computational overhead in a typical web browser. We further present a threshold MFKDF construction, allowing for client-side key recovery and reconstitution if a factor is lost. Finally, by "stacking" derived keys, we provide a means of cryptographically enforcing arbitrarily specific key derivation policies. The result is a paradigm shift toward direct cryptographic protection of user data using all available authentication factors, with no noticeable change to the user experience. We demonstrate the ability of our solution to not only significantly improve the security of existing systems implementing PBKDFs, but also to enable new applications where PBKDFs would not be considered a feasible approach.
引用
收藏
页码:2097 / 2114
页数:18
相关论文
共 50 条
  • [21] Multi-Factor Authenticated Key Exchange Protocol in the Three-Party Setting
    Liu, Ying
    Wei, Fushan
    Ma, Chuangui
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 255 - 267
  • [22] Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
    Lindell, Yehuda
    Nof, Ariel
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1837 - 1854
  • [23] Secure, efficient and practical key management scheme in the complete-subtree method
    Nojima, R
    Kaji, Y
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01): : 189 - 194
  • [24] Multi-layer key management for secure multimedia multicast communications
    Sun, Y
    Liu, KJR
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 205 - 208
  • [25] Key Management Scheme for Multi-Layer Secure Group Communication
    Aparna, R.
    Amberker, B. B.
    2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), 2009, : 218 - +
  • [26] Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service
    Li, Zengpeng
    Wang, Jiuru
    Choi, Chang
    Zhang, Wenyin
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 663 - 674
  • [27] A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks
    Kar, Sumit
    Sethi, Srinivas
    Sahoo, Ramesh Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2523 - 2540
  • [28] A Multi-factor Trust Management Scheme for Secure Spectrum Sensing in Cognitive Radio Networks
    Sumit Kar
    Srinivas Sethi
    Ramesh Kumar Sahoo
    Wireless Personal Communications, 2017, 97 : 2523 - 2540
  • [29] A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
    Nikravan, Mohammad
    Reza, Akram
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (01) : 463 - 494
  • [30] A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things
    Mohammad Nikravan
    Akram Reza
    Wireless Personal Communications, 2020, 111 : 463 - 494