On the resilience of key agreement protocols to key compromise impersonation

被引:0
|
作者
Strangio, Maurizio Adriano [1 ]
机构
[1] Univ Roma Tor Vergata, Rome, Italy
来源
关键词
key compromise impersonation; key agreement protocols;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper focuses on key agreement protocols in the asymmetric trust model, wherein parties hold a public/private key pair. In particular, we consider a type of known key attack called key compromise impersonation that may occur once the adversary has obtained the private key of an honest party. This attack represents a subtle threat that is often underestimated and difficult to counter. Several protocols are shown vulnerable to this attack despite their authors. claiming the opposite. We also consider in more detail how three formal (complexity-theoretic based) models of distributed computing found in the literature cover such attacks.
引用
收藏
页码:233 / 247
页数:15
相关论文
共 50 条
  • [31] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [32] WEAKNESSES IN SOME RECENT KEY AGREEMENT PROTOCOLS
    NYBERG, K
    RUEPPEL, RA
    ELECTRONICS LETTERS, 1994, 30 (01) : 26 - 27
  • [33] On the importance of public-key validation in the MQV and HMQV key agreement protocols
    Menezes, Alfred
    Ustaoglu, Berkant
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 133 - +
  • [34] Downgrade Resilience in Key-Exchange Protocols
    Bhargavan, Karthikeyan
    Brzuska, Christina
    Fournet, Cedric
    Green, Matthew
    Kohlweiss, Markulf
    Zanella-Beguelin, Santiago
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 506 - 525
  • [35] On key agreement and conference key agreement
    Boyd, C
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 294 - 302
  • [36] Key Agreement and Authentication Protocols in the Internet of Things: A Survey
    Szymoniak, Sabina
    Kesar, Shalini
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [37] Formal design of efficient authentication and key agreement protocols
    Jacobson, G
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113
  • [38] A Survey on Group Key Agreement Protocols in Cloud Environment
    Li, Meng
    Zhang, Ruijie
    Du, Xiang
    Zhou, Min
    Yan, Luqi
    Song, Jiacheng
    2018 FIRST INTERNATIONAL COGNITIVE CITIES CONFERENCE (IC3 2018), 2018, : 160 - 165
  • [39] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [40] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392