On the resilience of key agreement protocols to key compromise impersonation

被引:0
|
作者
Strangio, Maurizio Adriano [1 ]
机构
[1] Univ Roma Tor Vergata, Rome, Italy
来源
关键词
key compromise impersonation; key agreement protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper focuses on key agreement protocols in the asymmetric trust model, wherein parties hold a public/private key pair. In particular, we consider a type of known key attack called key compromise impersonation that may occur once the adversary has obtained the private key of an honest party. This attack represents a subtle threat that is often underestimated and difficult to counter. Several protocols are shown vulnerable to this attack despite their authors. claiming the opposite. We also consider in more detail how three formal (complexity-theoretic based) models of distributed computing found in the literature cover such attacks.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 50 条
  • [1] Key-compromise Impersonation Attacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols
    Gao Meng
    Zhang Futai
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 62 - 66
  • [2] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24
  • [3] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
  • [4] On the key-compromise impersonation vulnerability of one-pass key establishment protocols
    Chalkias, K.
    Mpaldimtsi, F.
    Hristu-Varsakelis, D.
    Stephanides, G.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 222 - 228
  • [5] Impersonation attacks on key agreement Protocols resistant to denial of service attacks
    Shim, Kyune-Ah
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (07): : 2306 - 2309
  • [6] Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols
    Chalkias, K.
    Baldimtsi, F.
    Hristu-Varsakelis, D.
    Stephanides, G.
    E-BUSINESS AND TELECOMMUNICATIONS, 2008, 23 : 227 - 238
  • [7] Key control in key agreement protocols
    Mitchell, CJ
    Ward, M
    Wilson, P
    ELECTRONICS LETTERS, 1998, 34 (10) : 980 - 981
  • [8] Impersonation attack on CertificateLess key agreement protocol
    Bala, Suman
    Sharma, Gaurav
    Verma, Anil K.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2018, 27 (02) : 108 - 120
  • [9] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    Inam ul haq
    Jian Wang
    Youwen Zhu
    Saad Maqbool
    Digital Communications and Networks, 2021, 7 (01) : 140 - 150
  • [10] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
    ul Haq, Inam
    Wang, Jian
    Zhu, Youwen
    Maqbool, Saad
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (01) : 140 - 150