Strongly leakage resilient authenticated key exchange, revisited

被引:11
|
作者
Yang, Guomin [2 ]
Chen, Rongmao [1 ]
Mu, Yi [2 ]
Susilo, Willy [2 ]
Guo, Fuchun [2 ]
Li, Jie [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Authenticated key exchange; Key leakage; Weak randomness; CRYPTOGRAPHY;
D O I
10.1007/s10623-019-00656-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each other and agree on a common secret key, which is essential for establishing a secure communication channel over a public network. AKE protocols form a central component in many network security standards such as IPSec, TLS/SSL, and SSH. However, it has been demonstrated that many standardized AKE protocols are vulnerable to side-channel and key leakage attacks. In order to defend against such attacks, leakage resilient (LR-) AKE protocols have been proposed in the literature. Nevertheless, most of the existing LR-AKE protocols only focused on the resistance to long-term key leakage, while in reality leakage of ephemeral secret key (or randomness) can also occur due to various reasons such as the use of poor randomness sources or insecure pseudo-random number generators (PRNGs). In this paper, we revisit the strongly leakage resilient AKE protocol (CT-RSA'16) that aimed to resist challenge-dependent leakage on both long-term and ephemeral secret keys. We show that there is a security issue in the design of the protocol and propose an improved version that can fix the problem. In addition, we extend the protocol to a more general framework that can be efficiently instantiated under various assumptions, including hybrid instantiations that can resist key leakage attacks while preserving session key security against future quantum machines.
引用
收藏
页码:2885 / 2911
页数:27
相关论文
共 50 条
  • [1] Strongly leakage resilient authenticated key exchange, revisited
    Guomin Yang
    Rongmao Chen
    Yi Mu
    Willy Susilo
    Fuchun Guo
    Jie Li
    [J]. Designs, Codes and Cryptography, 2019, 87 : 2885 - 2911
  • [2] Strongly Leakage-Resilient Authenticated Key Exchange
    Chen, Rongmao
    Mu, Yi
    Yang, Guomin
    Susilo, Willy
    Guo, Fuchun
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 19 - 36
  • [3] A Note on Leakage-Resilient Authenticated Key Exchange
    Chun, Ji Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2274 - 2279
  • [4] Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 15 - 30
  • [5] Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence
    Zhang, Jie
    Zhang, Futai
    Huang, Xin
    Liu, Xin
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2835 - 2847
  • [6] Leakage-Resilient Password-Based Authenticated Key Exchange
    Ruan, Ou
    Zhang, Mingwu
    Chen, Jing
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 285 - 296
  • [7] An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol
    Ruan, Ou
    Yang, Yang
    Zhang, Mingwu
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 665 - 674
  • [8] Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (06) : 1306 - 1317
  • [9] An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3968 - 3979
  • [10] Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Fujioka, Atsushi
    Suzuki, Koutarou
    Yoneyama, Kazuki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 164 - 180