Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

被引:0
|
作者
Gorantla, M. Choudary [1 ]
Boyd, Colin [1 ]
Gonzalez Nieto, Juan Manuel [1 ]
机构
[1] Queensland Univ Technol, Fac IT, Informat Secur Inst, Brisbane, Qld 4001, Australia
关键词
Group Key Exchange; Key Compromise Impersonation; Insider Attacks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has, not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks oil these protocols demonstrate the necessity of considering KCI resilience. Finally, we give a new proof of security for all existing GKE protocol under the revised model assuming random oracles.
引用
收藏
页码:105 / 123
页数:19
相关论文
共 50 条
  • [21] ECKCI: An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for TMIS
    Pirmoradian, Fatemeh
    Dakhilalian, Seyed Mohammad
    Safkhani, Masoumeh
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 16 (02): : 115 - 136
  • [22] A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel L.
    Soriente, Claudio
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1336 - 1353
  • [23] Bilateral unknown key-share attacks in key agreement Protocols
    Chen, Liqun
    Tang, Qiang
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (03) : 416 - 440
  • [24] On security models and compilers for group key exchange protocols (Extended abstract)
    Bresson, Emmanuel
    Manulis, Mark
    Schwenk, Joerg
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 292 - +
  • [25] Modeling advanced security aspects of key exchange and secure channel protocols
    Gunther, Felix
    IT-INFORMATION TECHNOLOGY, 2020, 62 (5-6): : 287 - 293
  • [26] ON THE STRUCTURE OF SECRET KEY EXCHANGE PROTOCOLS
    BELLARE, M
    COWEN, L
    GOLDWASSER, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 604 - 605
  • [27] A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks
    Ren, Huimin
    Kim, Suhyun
    Seo, Daehee
    Lee, Imyeong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (05): : 1687 - 1707
  • [28] Rogue key and impersonation attacks on FIDO2: From theory to practice
    Barbosa, Manuel
    Cirne, Andre
    Esquivel, Luis
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [29] Secure group key distribution protocols
    Chen, X
    Shen, J
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 307 - 311
  • [30] On the performance of group key agreement protocols
    Amir, Y
    Kim, Y
    Nita-Rotaru, C
    Tsudik, G
    22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 463 - 464