首页> 外文会议>Institute of Electrical and Electronics Engineers International Symposium on Information Theory >Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars
【24h】

Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars

机译:拦截加密协议中的令牌:帝国罢工回到克隆战争中

获取原文

摘要

Achieving information-theoretically secure key exchange between two parties requires some “hardware set-up”, like the possibility to transmit quantum bits. An alternative approach, which recently emerged in the crypto community, is to use tamper-resistant hardware tokens in protocols. However, such tokens need to be transmitted physically between parties, opening up the possibility to attack the actual transfer of the token, possibly in combination with attacks on the digital protocol. We discuss such interception attacks on cryptographic protocols which rely on trustworthy hardware like one-time memory tokens (Goldwasser et al., Crypto 2008). In such attacks the adversary can mount man-in-the-middle attacks and access, or even substitute, transmitted tokens. We show that many of the existing token-based protocols are vulnerable against this kind of attack, which typically lies outside of the previously considered security models. We also give a positive result for protocols remaining secure against such attacks. We present a very efficient protocol for password-based authenticated key exchange based on the weak model of one-time memory tokens. Our protocol only requires four moves, very basic operations, and the sender to send ℓ tokens in the first step for passwords of length ℓ. At the same time we achieve information-theoretic security in Canetti's universal composition framework (FOCS 2001) against adaptive adversaries (assuming reliable erasure), even if the tokens are not guaranteed to be transferred securely, i.e., even if the adversary can read or substitute transmitted tokens.
机译:在理论上实现两个方之间的理论上安全密钥交换需要一些“硬件设置”,例如传输量子位的可能性。最近在Crypto社区中出现的替代方法,是在协议中使用篡改硬件令牌。但是,这些令牌需要在各方之间物理传输,打开可能攻击令牌的实际传输,可能与数字协议的攻击结合使用。我们讨论了依赖于一次性内存令牌等值得信赖的硬件的加密协议的这种拦截攻击(Goldwasser等,加密2008)。在这种攻击中,对手可以安装中间人攻击和访问,甚至替代,传输的令牌。我们表明许多现有的基于令牌的协议易受这种攻击,这通常位于以前考虑的安全模型之外。我们还为剩余的协议提供了积极的结果,以防止这种攻击。我们为基于密码的身份验证密钥交换提供了一个非常有效的协议,基于一次性内存令牌的弱模型。我们的协议只需要四个动作,非常基本的操作,以及发件人在第一个步骤中为长度的第一步发送ℓ令牌。同时,我们在Canetti的普遍构成框架(Focs 2001)中实现了信息化学安全,这对于适应性对手(假设可靠的擦除),即使不保证牢固地转移,即即使对手可以读取或替代,即使也可以读取或替代传输的令牌。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号