Analyzing and Patching SPEKE in ISO/IEC

被引:8
|
作者
Hao, Feng [1 ]
Metere, Roberto [1 ]
Shahandashti, Siamak F. [2 ]
Dong, Changyu [1 ]
机构
[1] Newcastle Univ, Sch Comp, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
[2] Univ York, Dept Comp Sci, York YO10 5GH, N Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
Password-based authenticated key exchange; formal methods; key agreement; PROTOCOLS; AUTHENTICATION;
D O I
10.1109/TIFS.2018.2832984
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Simple password exponential key exchange (SPEKE) is a well-known password authenticated key exchange protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products. It has also been included into international standards such as ISO/IEC 11770-4 and IEEE P1363.2. In this paper, we analyze the SPEKE protocol as specified in the ISO/IEC and IEEE standards. We identify that the protocol is vulnerable to two new attacks: an impersonation attack that allows an attacker to impersonate a user without knowing the password by launching two parallel sessions with the victim, and a key-malleability attack that allows a man-in-the-middle to manipulate the session key without being detected by the end users. Both attacks have been acknowledged by the technical committee of ISO/IEC SC 27 and ISO/IEC 11770-4 revised as a result. We propose a patched SPEKE called P-SPEKE and present a formal analysis in the Applied Pi Calculus using ProVerif to show that the proposed patch prevents both attacks. The proposed patch has been included into the latest revision of ISO/IEC 11770-4 published in 2017.
引用
收藏
页码:2844 / 2855
页数:12
相关论文
共 50 条
  • [21] ISO/IEC 17020和ISO/IEC 17065标准对机构要求的异同
    王勃
    王静
    孙芳
    [J]. 质量与认证, 2021, (01) : 57 - 59
  • [22] Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408
    Lee, Eun-Ser
    Kim, Haeng-Kon
    Hwang, Sun-Myoung
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 25 - +
  • [23] ISO/IEC17025与ISO/IEC导则25的主要变化
    潘顺芳
    黄涛
    [J]. 中国检验检测, 2001, (05) : 53 - 55
  • [24] Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Sun, Wen
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 204 - 209
  • [25] A Supporting Tool for IT System Security Specification Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Goto, Yuichi
    Cheng, Jingde
    [J]. TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2019 WORKSHOPS, 2019, 11607 : 3 - 14
  • [26] ISO/IEC17025与ISO/IEC导则25的比照分析
    吴听
    齐建华
    [J]. 计测技术, 2001, (01) : 3 - 10
  • [27] 浅析ISO/IEC17025与ISO/IEC导则25的关系
    方华
    [J]. 中国口岸科学技术, 2000, (06) : 26 - 27
  • [28] ISO 9001与ISO/IEC 17025之异同
    黄涛
    [J]. 电动工具, 2006, (03) : 15 - 24
  • [29] 聚焦ISO/IEC 27001:2013
    韩广福
    [J]. 质量与认证, 2013, (12) : 52 - 52
  • [30] ISO/IEC近期工作动态
    罗文臣
    [J]. 船舶标准化与质量, 2013, (04) : 65 - 65