首页> 外文会议>Annual IFIP WG 11.3 conference on data and applications security and privacy >The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol
【24h】

The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol

机译:代理中介的密钥协商协议中密钥妥协的后果

获取原文

摘要

In this paper, we analyze how key compromise affects the protocol by Nguyen et al. presented at ESORICS 2016, an authenticated key agreement protocol mediated by a proxy entity, restricted to only symmetric encryption primitives and intended for IoT environments. This protocol uses long-term encryption tokens as intermediate values during encryption and decryption procedures, which implies that these can be used to encrypt and decrypt messages without knowing the corresponding secret keys. In our work, we show how key compromise (or even compromise of encryption tokens) allows to break forward security and leads to key compromise impersonation attacks. Moreover, we demonstrate that these problems cannot be solved even if the affected user revokes his compromised secret key and updates it to a new one. The conclusion is that this protocol cannot be used in IoT environments, where key compromise is a realistic risk.
机译:在本文中,我们分析了密钥妥协如何影响Nguyen等人的协议。在ESORICS 2016上提出的一种由代理实体介导的经过身份验证的密钥协议协议,仅限于对称加密原语,适用于IoT环境。该协议在加密和解密过程中将长期加密令牌用作中间值,这意味着可以将这些令牌用于加密和解密消息,而无需知道相应的秘密密钥。在我们的工作中,我们展示了密钥泄露(甚至加密令牌的泄露)如何破坏安全性并导致密钥泄露模拟攻击。此外,我们证明,即使受影响的用户撤消了其泄露的秘密密钥并将其更新为新的密钥,也无法解决这些问题。结论是,该协议不能在物联网环境中使用,在该环境中,关键的妥协是现实的风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号