ON SECURITY OF THE SESPAKE PROTOCOL

被引:0
|
作者
Alekseev, E. K. [1 ]
Smyshlyaev, S., V [1 ]
机构
[1] CryptoPro, Moscow, Russia
来源
关键词
models and methods in information security; cryptographic protocols; AUTHENTICATED KEY EXCHANGE;
D O I
10.17223/20710410/50/1
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The Security Evaluated Standardized Password Authenticated Key Exchange (SES-PAKE) protocol is standardized in Russia as R 50.1.115-2016. The current paper provides analysis of the protocol in relevant adversary models. We define new indistinguishability-based adversary model with a threat of false authentication that is an extension of the original indistinguishability-based model up to the case of protocols with authentication step without key diversification. We prove the protocol security in two adversary models with a classic threat of distinguishing a generated session key from a random string and with a threat of false authentication.
引用
收藏
页码:5 / 41
页数:37
相关论文
共 50 条
  • [1] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    [J]. IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [2] The OSD security protocol
    Factor, Michael
    Nagle, David
    Naor, Dalit
    Riedel, Erik
    Satran, Julian
    [J]. THIRD INTERNATIONAL IEEE SECURITY IN STORAGE WORKSHOP, PROCEEDINGS, 2006, : 29 - +
  • [3] Internet security protocol
    Markham, T
    [J]. DR DOBBS JOURNAL, 1997, 22 (06): : 70 - +
  • [4] On the Security of the Dandelion Protocol
    Goncalves, Brian
    Mashatan, Atefeh
    [J]. MATHEMATICS, 2022, 10 (07)
  • [5] Managing Security: The Security Content Automation Protocol
    Radack, Shirley
    Kuhn, Rick
    [J]. IT PROFESSIONAL, 2011, 13 (01) : 9 - 11
  • [6] A Lightweight IoT Security Protocol
    Hammi, Mohamed Tahar
    Livolant, Erwan
    Bellot, Patrick
    Serhrouchni, Ahmed
    Minet, Pascale
    [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [7] Set: A questionable security protocol
    Shoniregun, Charles A.
    Zhao, Songhe
    [J]. WEBIST 2007: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL IT: INTERNET TECHNOLOGY, 2007, : 313 - +
  • [8] THE INTERROGATOR - PROTOCOL SECURITY ANALYSIS
    MILLEN, JK
    CLARK, SC
    FREEDMAN, SB
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 274 - 288
  • [9] A security protocol for sensor networks
    Stewart, K
    Haniotakis, T
    Tragoudas, S
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1827 - 1831
  • [10] Enhanced Security for Passport Protocol
    Tyagi, S. S.
    Chauhan, R. K.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 234 - +