首页> 外文会议>Cryptographers' Track at the RSA Conference >Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
【24h】

Session Corruption Attack and Improvements on Encryption Based MT-Authenticators

机译:基于加密的MT-Authenticators的会话腐败攻击和改进

获取原文

摘要

Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of practical attackers but also provides a modular approach to the design of secure key exchange protocols. One important element in this approach is the MT-authenticator. An MT-authenticator transforms a message transmission protocol for an ideally authenticated network to an equivalent protocol for a real, unauthenticated network such that all attacks that can be launched in the unauthenticated network can also be launched in the authenticated network. In this paper, we show that the proof of the encryption-based MT-authenticator proposed in their paper is flawed, which leads to their encryption-based MT-authenticator insecure. An attack called session corruption attack can be launched successfully against the MT-authenticator in the unauthenticated network but not against the corresponding message transmission protocol in the authenticated network. To thwart this attack, we propose several improved techniques and two new encryption-based MT-authenticators.
机译:Bellare,Canetti和Krawczyk提出了一个安全模型(BCK模型),用于1998年进行身份验证和关键交换协议。该模型不仅合理地捕获了实用攻击者的力量,还提供了一种模块化的方法来设计安全密钥交换协议的设计。这种方法中的一个重要元素是MT认证器。 MT-Authenticator将理想的经过身份验证的网络转换为实际,未经认定的网络的等效协议,以便在经过身份验证的网络中启动可以在未经身份验证的网络中启动的所有攻击。在本文中,我们表明,以纸张提出的加密的MT-Authenticator的证明缺陷,这导致其加密的基于加密的MT-Authenticator不安全。可以在未经身份验证的网络中的MT-Authenticator中成功启动称为会话损坏攻击的攻击,但不针对经过认证网络中的相应消息传输协议。为了挫败这次攻击,我们提出了几种改进的技术和两个基于加密的MT认证器。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号