...
首页> 外文期刊>Designs, Codes and Crytography >Strongly leakage resilient authenticated key exchange, revisited
【24h】

Strongly leakage resilient authenticated key exchange, revisited

机译:强烈泄漏弹性认证密钥交换,重新审视

获取原文
获取原文并翻译 | 示例
           

摘要

Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each other and agree on a common secret key, which is essential for establishing a secure communication channel over a public network. AKE protocols form a central component in many network security standards such as IPSec, TLS/SSL, and SSH. However, it has been demonstrated that many standardized AKE protocols are vulnerable to side-channel and key leakage attacks. In order to defend against such attacks, leakage resilient (LR-) AKE protocols have been proposed in the literature. Nevertheless, most of the existing LR-AKE protocols only focused on the resistance to long-term key leakage, while in reality leakage of ephemeral secret key (or randomness) can also occur due to various reasons such as the use of poor randomness sources or insecure pseudo-random number generators (PRNGs). In this paper, we revisit the strongly leakage resilient AKE protocol (CT-RSA'16) that aimed to resist challenge-dependent leakage on both long-term and ephemeral secret keys. We show that there is a security issue in the design of the protocol and propose an improved version that can fix the problem. In addition, we extend the protocol to a more general framework that can be efficiently instantiated under various assumptions, including hybrid instantiations that can resist key leakage attacks while preserving session key security against future quantum machines.
机译:经过身份验证的密钥交换(AKE)协议允许两个(或多个)缔约方相互身份验证并同意共同的密钥,这对于在公共网络上建立安全通信信道至关重要。 AKE协议在许多网络安全标准中形成一个中心组件,例如IPSec,TLS / SSL和SSH。然而,已经证明,许多标准化的AKE协议容易受到侧通道和钥匙泄漏攻击。为了防御这种攻击,在文献中提出了泄漏弹性(LR-)AKE方案。然而,大多数现有的LR-AKE协议仅重点关注长期关键泄漏,而在季节秘密密钥(或随机性)的现实泄漏中也可能发生由于诸如使用差的随机性来源或不安全伪随机数发生器(PRNG)。在本文中,我们重新审视了旨在抵抗长期和短暂秘密键对依赖挑战依赖性泄漏的强烈泄漏的弹性AKE协议(CT-RSA'16)。我们表明协议的设计中存在安全问题,并提出了一种可以解决问题的改进版本。此外,我们将协议扩展到更一般的框架,可以在各种假设下有效地实例化,包括可以抵抗密钥泄漏攻击的混合实例化,同时保留对未来量子机器的会话密钥安全性。

著录项

  • 来源
    《Designs, Codes and Crytography》 |2019年第12期|2885-2911|共27页
  • 作者单位

    Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia;

    Natl Univ Def Technol Coll Comp Changsha Hunan Peoples R China;

    Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia;

    Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia;

    Univ Wollongong Sch Comp & Informat Technol Wollongong NSW Australia;

    Natl Univ Def Technol Coll Comp Changsha Hunan Peoples R China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Authenticated key exchange; Key leakage; Weak randomness;

    机译:经过身份验证的密钥交换;钥匙泄漏;随机性弱;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号