On the resilience of key agreement protocols to key compromise impersonation

被引:0
|
作者
Strangio, Maurizio Adriano [1 ]
机构
[1] Univ Roma Tor Vergata, Rome, Italy
来源
关键词
key compromise impersonation; key agreement protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper focuses on key agreement protocols in the asymmetric trust model, wherein parties hold a public/private key pair. In particular, we consider a type of known key attack called key compromise impersonation that may occur once the adversary has obtained the private key of an honest party. This attack represents a subtle threat that is often underestimated and difficult to counter. Several protocols are shown vulnerable to this attack despite their authors. claiming the opposite. We also consider in more detail how three formal (complexity-theoretic based) models of distributed computing found in the literature cover such attacks.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 50 条
  • [21] Bilateral unknown key-share attacks in key agreement Protocols
    Chen, Liqun
    Tang, Qiang
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2008, 14 (03) : 416 - 440
  • [22] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [23] Modular security proofs for key agreement protocols
    Kudla, C
    Paterson, KG
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 549 - 565
  • [24] Cryptanalysis of simple authenticated key agreement protocols
    Yang, CC
    Chang, TY
    Hwang, MS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08): : 2174 - 2176
  • [25] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257
  • [26] Reusing Static Keys in Key Agreement Protocols
    Chatterjee, Sanjit
    Menezes, Alfred
    Ustaoglu, Berkant
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 39 - +
  • [27] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng R.
    Wang L.
    International Journal of Ad Hoc and Ubiquitous Computing, 2020, 34 (04): : 249 - 257
  • [28] Non-abelian key agreement protocols
    Anshel, I
    Anshel, M
    Goldfeld, D
    DISCRETE APPLIED MATHEMATICS, 2003, 130 (01) : 3 - 12
  • [29] Automated Verification of Group Key Agreement Protocols
    Schmidt, Benedikt
    Sasse, Ralf
    Cremers, Cas
    Basin, David
    2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 179 - 194
  • [30] Categorical interpretations of some key agreement protocols
    Inassaridze N.
    Kandelaki T.
    Ladra M.
    Journal of Mathematical Sciences, 2013, 195 (4) : 439 - 444