Security analysis of SM2 key exchange protocol in TPM2.0

被引:5
|
作者
Zhao, Shijun [1 ]
Xi, Li [1 ]
Zhang, Qianying [1 ]
Qin, Yu [1 ]
Feng, Dengguo [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
authenticated key exchange; SM2 key exchange; provable security; UKS attacks; key-compromise impersonation attacks; CK model; TPM2.0; AGREEMENT;
D O I
10.1002/sec.987
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The new released trusted platform module (TPM) specification, TPM2.0, adds cryptographic support for key exchange by providing SM2 authenticated key exchange (AKE) application programming interface (API) commands. Xu analyzed the SM2 AKE protocol and found that it was insecure in common computing environment by presenting two types of unknown key share attacks. Here, we present another design weakness of the SM2 AKE protocol, which might cause that the protocol cannot be proven secure in modern security models. We also analyze the security of SM2 AKE protocol in TPM2.0, whose running environment is very different and find that (i) it indeed gets some security improvements through the protection capability provided by the two SM2 AKE commands of TPM2.0 but (ii) it still has some weaknesses, which might lead to unknown key share and key-compromise impersonation attacks because of the bad design of the TPM2.0 application programming interface. We solve the weaknesses of SM2 AKE protocol in TPM2.0 by slightly modifying one SM2 AKE command and finally give a formal proof of our solution in the Canetti and Krawczyk model. Our work shows that TPM2.0 could provide a proven secure SM2 AKE by slightly modifying one command. Copyright (C) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:383 / 395
页数:13
相关论文
共 50 条
  • [1] Formal analysis of TPM2.0 key management APIs
    Zhang, Qianying
    Zhao, Shijun
    Qin, Yu
    Feng, Dengguo
    [J]. CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4210 - 4224
  • [2] Comments on the SM2 Key Exchange Protocol
    Xu, Jing
    Feng, Dengguo
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 160 - 171
  • [3] Formal analysis of TPM2.0 key management APIs
    Qianying Zhang
    Shijun Zhao
    Yu Qin
    Dengguo Feng
    [J]. Science Bulletin, 2014, 59 (32) : 4210 - 4224
  • [4] TPM2.0 Key Migration-protocol Based on Duplication Authority
    Tan L.
    Song M.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2287 - 2313
  • [5] On the provable security of TPM2.0 cryptography APIs
    Chu, Xiaobo
    Feng, Dengguo
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 230 - 243
  • [6] Partially known information attack on SM2 key exchange protocol
    Wei Wei
    Jiazhe Chen
    Dan Li
    Beibei Wang
    [J]. Science China Information Sciences, 2019, 62
  • [7] Partially known information attack on SM2 key exchange protocol
    Wei WEI
    Jiazhe CHEN
    Dan LI
    Beibei WANG
    [J]. Science China(Information Sciences), 2019, 62 (03) : 61 - 74
  • [8] Partially known information attack on SM2 key exchange protocol
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Wang, Beibei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [9] Formal analysis of HMAC authorisation in the TPM2.0 specification
    Shao, Jianxiong
    Qin, Yu
    Feng, Dengguo
    [J]. IET INFORMATION SECURITY, 2018, 12 (02) : 133 - 140
  • [10] A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0
    Zhao, Shijun
    Zhang, Qianying
    [J]. TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 40 - 57