Forcing future public ephemeral keys to attack authenticated key establishment protocols | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2024. № 66. DOI: 10.17223/20710410/66/6

This paper studies the security of the authenticated key establishment protocols against the adversary who has the capability to force the participants to use of ephemeral public values. The paper substantiates the relevance of considering this capability, describes, in particular, attacks on the SIGMA, SIGMA-R, STS-MAC, Echinacea-3 protocols and the post-quantum BKM-KK protocol, and discusses the design features of protocols that allow to protect against attacks of this type.
Download file
Counter downloads: 8
  • Title Forcing future public ephemeral keys to attack authenticated key establishment protocols
  • Headline Forcing future public ephemeral keys to attack authenticated key establishment protocols
  • Publesher Tomask State UniversityTomsk State University
  • Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 66
  • Date:
  • DOI 10.17223/20710410/66/6
Keywords
cryptography, cryptographic protocol, authenticated key establishment, attack, forcing public ephemeral keys
Authors
References
Алексеев Е. К. Что плохого можно сделать, неправильно используя криптоалгоритмы? Симпозиум CTCrvpt 2019. https://ctcrypt.ru/files/files/2019/materials/29_Alekseyev.pdf. 2019.
Алексеев Е. К., Ахметзянова Л. Р., Божко А. А., Грибоедова Е. С. Теоретическая криптография в реальных условиях. Блог компании КриптоПро. https://cryptopro.ru/blog/2019/11/19/teoreticheskaya-cryptografiya-v-realnykh-usloviyakh. 2020.
Царегородцев К. Д., Грибоедова Е. С. Еще раз о важности построения модели противника на примере протокола аутентификации 5G-AKA // Конференция РусКрип-то'2022. https://ruscrypto.ru/resource/archive/rc2022/files/02_tsaregorodsev_griboedova.pdf. 2022.
Degabriele J. P., Paterson K. G., and Watson G. J. Provable security in the real world // IEEE Security & Privacy. 2011. V. 9. No. 3. P. 33-41.
Алексеев E. К., Ахметзянова Л. P., Божко А. А. и dp. О возможностях нарушителя при атаках на некоторый класс протоколов аутентифицированной выработки общего ключа. Конференция РусКрипто'2022. https://ruscrypto.ru/resource/archive/rc2022/files/02_alekseyev_akhmetzyanova_kutsenok_kyazhin.pdf. 2022.
Krawczyk Н. The order of encryption and authentication for protecting communications (or: How secure is SSL?) // LNCS.'2001. V.2139. P.310-331.
Cancel B., Hiltgen A., Vaudenay S., and Vuagnoux M. Password interception in a SSL/TLS channel // LNCS. 2003. Y.2729. P.583-599.
Kaufman C., Hoffman P., Nir Y., et al.Internet Key Exchange Protocol Version 2 (IKEv2). RFC 7296. 2014.
Shejfer Y. and Fluhrer S. Additional Diffie - Heilman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 6989. 2013.
Seye P.B. and Sarr A.P. Enhanced modelling of authenticated key exchange security // LNCS. 2017. V. 10547. P. 36-52.
Alekseev Е. К., Babueva A. A., and Zazykina О. А. АКЕ Zoo: 100 Two-Party Protocols (to be continued). Cryptology ePrint Archive. 2023. Paper 2023/1044.
Huang H. and Cao Z. Authenticated Key Exchange Protocols with Enhanced Freshness Properties. Cryptology ePrint Archive. 2009. Paper 2009/505.
Krawczyk H. SIGMA: The ‘SIGn-and-МАс' approach to authenticated Diffie - Heilman and its use in the IKE protocols // LNCS. 2003. V.2729. P.400-425.
Jeong I.R., Katz J., and Lee D.H. One-round protocols for two-party authenticated key exchange // LNCS. 2004. V. 3089. P. 220-232.
Jeong I.R., Katz J., and Lee D.H. One-Round Protocols for Two-Party Authenticated Key Exchange, https://www.cs.umd.edu/~jkatz/papers/lround_AKE.pdf. 2008.
Rescorla E. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446. 2018.
Diffie W., Van Oorschot P. C., and Wiener M. J. Authentication and authenticated key exchanges // Des. Codes Crvptogr. 1992. V. 2. P. 107-125.
Информационная технология. Криптографическая защита информации. Схемы выработки общего ключа с аутентификацией на основе открытого ключа. Р 1323565.1.0042017. М.: Стандартинформ, 2017.
Cremers С. and Feltz М. One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniabilitv. Cryptology ePrint Archive. 2011. Paper 2011/300.
Song B. and Kim K. Two-pass authenticated key agreement protocol with key confirmation // LNCS. 2000. V. 1977. P.237-249.
Boyd C., Kock B., and Millerjord L. Modular Design of KEM-Based Authenticated Key Exchange. Cryptology ePrint Archive. 2023. Paper 2023/167.
Schwabe P., Stebila D., and Wiggers T. Post-quantum TLS without handshake signatures // Proc. 2020 ACM SIGSAC Conf. CCS'20. USA, 2020. P. 1461-1480.
 Forcing future public ephemeral keys to attack authenticated key establishment protocols | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2024. № 66. DOI: 10.17223/20710410/66/6
Forcing future public ephemeral keys to attack authenticated key establishment protocols | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2024. № 66. DOI: 10.17223/20710410/66/6
Download full-text version
Counter downloads: 125