Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

被引:0
|
作者
Gorantla, M. Choudary [1 ]
Boyd, Colin [1 ]
Gonzalez Nieto, Juan Manuel [1 ]
机构
[1] Queensland Univ Technol, Fac IT, Informat Secur Inst, Brisbane, Qld 4001, Australia
关键词
Group Key Exchange; Key Compromise Impersonation; Insider Attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has, not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks oil these protocols demonstrate the necessity of considering KCI resilience. Finally, we give a new proof of security for all existing GKE protocol under the revised model assuming random oracles.
引用
收藏
页码:105 / 123
页数:19
相关论文
共 50 条
  • [1] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24
  • [2] Key-compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols
    Gao Meng
    Zhang Futai
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 62 - 66
  • [3] On the resilience of key agreement protocols to key compromise impersonation
    Strangio, Maurizio Adriano
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2006, 4043 : 233 - 247
  • [4] Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
    Chalkias, K.
    Baldimtsi, F.
    Hristu-Varsakelis, D.
    Stephanides, G.
    E-BUSINESS AND TELECOMMUNICATIONS, 2008, 23 : 227 - 238
  • [5] An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
    Chen, Ting
    Li, Xinghua
    Cheng, Qingfeng
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (09)
  • [6] An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
    Ting CHEN
    Xinghua LI
    Qingfeng CHENG
    Science China(Information Sciences), 2021, 64 (09) : 249 - 251
  • [7] An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
    Ting Chen
    Xinghua Li
    Qingfeng Cheng
    Science China Information Sciences, 2021, 64
  • [8] On the key-compromise impersonation vulnerability of one-pass key establishment protocols
    Chalkias, K.
    Mpaldimtsi, F.
    Hristu-Varsakelis, D.
    Stephanides, G.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 222 - 228
  • [9] Impersonation attacks on key agreement Protocols resistant to denial of service attacks
    Shim, Kyune-Ah
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (07): : 2306 - 2309
  • [10] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337