Analyzing and Patching SPEKE in ISO/IEC

被引:8
|
作者
Hao, Feng [1 ]
Metere, Roberto [1 ]
Shahandashti, Siamak F. [2 ]
Dong, Changyu [1 ]
机构
[1] Newcastle Univ, Sch Comp, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
[2] Univ York, Dept Comp Sci, York YO10 5GH, N Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
Password-based authenticated key exchange; formal methods; key agreement; PROTOCOLS; AUTHENTICATION;
D O I
10.1109/TIFS.2018.2832984
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Simple password exponential key exchange (SPEKE) is a well-known password authenticated key exchange protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products. It has also been included into international standards such as ISO/IEC 11770-4 and IEEE P1363.2. In this paper, we analyze the SPEKE protocol as specified in the ISO/IEC and IEEE standards. We identify that the protocol is vulnerable to two new attacks: an impersonation attack that allows an attacker to impersonate a user without knowing the password by launching two parallel sessions with the victim, and a key-malleability attack that allows a man-in-the-middle to manipulate the session key without being detected by the end users. Both attacks have been acknowledged by the technical committee of ISO/IEC SC 27 and ISO/IEC 11770-4 revised as a result. We propose a patched SPEKE called P-SPEKE and present a formal analysis in the Applied Pi Calculus using ProVerif to show that the proposed patch prevents both attacks. The proposed patch has been included into the latest revision of ISO/IEC 11770-4 published in 2017.
引用
收藏
页码:2844 / 2855
页数:12
相关论文
共 50 条