...
首页> 外文期刊>International journal of applied cryptography >Session-StateReveal is stronger than eCKs Ephemeral Key Reveal: using automatic analysis to attack the NAXOS protocol
【24h】

Session-StateReveal is stronger than eCKs Ephemeral Key Reveal: using automatic analysis to attack the NAXOS protocol

机译:Session-StateReveal比eCK的临时密钥显示更强大:使用自动分析来攻击NAXOS协议

获取原文
获取原文并翻译 | 示例
           

摘要

In the paper, 'stronger security of authenticated key exchange' (LaMacchia et al., 2006, 2007), a new security model for authenticated key exchange protocols (eCK) is proposed. The new model is suggested to be at least as strong as previous models for key exchange protocols, such as the CK model (Canetti and Krawczyk, 2001; Krawczyk, 2005). The model includes a new notion of an EphemeralKeyReveal adversary query, which is claimed in e.g., LaMacchia et al. (2006), Okamoto (2007), and Ustaoglu (2008), to be at least as strong as the Session-StateReveal query. We investigate the relation between the two models by focusing on the difference in adversary queries. We formally model the NAXOS protocol and a variant of the eCK model, called eCK', in which the EphemeralKeyReveal query is replaced by the Session-StateReveal query. Using Scyther, a formal protocol analysis tool, we automatically find attacks on the protocol, showing that the protocol is insecure in the eCK' model. Our attacks prove that the Session-StateReveal query is stronger than the EphemeralKeyReveal query and that the eCK security model is incomparable to the CK model, disproving several claims made in the literature.
机译:在论文“认证密钥交换的更高安全性”中(LaMacchia等,2006,2007),提出了一种新的认证密钥交换协议(eCK)的安全模型。建议新模型至少与以前的密钥交换协议模型一样强大,例如CK模型(Canetti和Krawczyk,2001; Krawczyk,2005)。该模型包括EphemeralKeyReveal对手查询的新概念,例如LaMacchia等人对此提出了要求。 (2006),冈本(2007)和Ustaoglu(2008),至少与Session-StateReveal查询一样强大。我们通过关注对手查询中的差异来研究两个模型之间的关系。我们正式为NAXOS协议和eCK模型的一个变体(称为eCK')建模,其中EphemeralKeyReveal查询被Session-StateReveal查询代替。使用正式的协议分析工具Scyther,我们可以自动发现对该协议的攻击,表明该协议在eCK'模型中不安全。我们的攻击证明Session-StateReveal查询比EphemeralKeyReveal查询更强大,并且eCK安全模型与CK模型不可比拟,从而驳斥了文献中的一些主张。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号