A security analysis of the cliques protocols suites

被引:30
|
作者
Pereira, O [1 ]
Quisquater, JJ [1 ]
机构
[1] Catholic Univ Louvain, Crypto Grp, B-1348 Louvain, Belgium
关键词
D O I
10.1109/CSFW.2001.930137
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure group protocols are not easy to design: this paper will show new attacks found against a protocol suite for sharing key. The method we propose to analyse these protocols is very systematic, and can be applied to numerous protocols of this type. The A-GDH.2 protocols suite analysed throughout this paper is part of the Cliques suites that propose extensions of the Diffie-Hellman key exchange protocol to a group setting. The A-GDH.2 main protocol is intended to allow a group to share an authenticated key while the other protocols of the suite allow to perform dynamic changes in the group constitution (adding and deleting members, fusion of groups,...). We are proposing an original method to analyse these protocols and are presenting a number of unpublished flaws with respect to each of the main security properties claimed in protocol definition (key authentication, perfect forward secrecy, resistance to known-keys attacks). Most of these flaws arise from the fact that using a group setting does not allow to reason about security properties in the same way as when only two (or three) parties are concerned. Our method has been easily applied on other Cliques protocols and allowed us to pinpoint similar flaws.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [1] Security analysis of the Cliques protocols suites: First results
    Pereira, O
    Quisquater, JJ
    [J]. TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 151 - 166
  • [2] Analysis of Security Protocols and Corresponding Cipher Suites in ETSI M2M Standards
    Adrianto, Daniel
    Lin, Fuchun Joseph
    [J]. 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2015, : 777 - 782
  • [3] Analysis of security protocols
    Durgin, NA
    Mitchell, JC
    [J]. CALCULATIONAL SYSTEM DESIGN, 1999, 173 : 369 - 394
  • [4] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [5] A decidable analysis of security protocols
    Rusinowitch, M
    [J]. EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
  • [6] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [7] Analysis of the security of SET protocols
    [J]. Xiaoxing Weixing Jisuanji Xitong, 9 (704-707):
  • [8] Hiding cliques for cryptographic security
    Juels, A
    Peinado, M
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (03) : 269 - 280
  • [9] Hiding Cliques for Cryptographic Security
    Ari Juels
    Marcus Peinado
    [J]. Designs, Codes and Cryptography, 2000, 20 : 269 - 280
  • [10] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299