Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
dc.creator | Chen,Liqun | |
dc.creator | Tang,Qiang | |
dc.date | 2008 | |
dc.date.accessioned | 2024-02-06T12:56:14Z | |
dc.date.available | 2024-02-06T12:56:14Z | |
dc.description | Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols. In this paper we revisit the definitions of this attribute and the method of proving this attribute under the Bellare-Rogaway (BR) model in the literature. We propose a new type of UKS attack, which coerces two entities A and B into sharing a key with each other but in fact A thinks that he is sharing the key with another entity C and B thinks that he is sharing the key with another entity D, where C and D might or might not be the same entity. We call this attack a Bilateral Unknown Key-Share (BUKS) attack. We demonstrate that a few well-known authenticated key agreement protocols are vulnerable to this attack. We then explore a gap between the conventional BR-type proof and a BUKS adversary's behavior, and extend the BR model to cover the BUKS resilience attribute. At the end of the paper, we provide a general countermeasure and its security proof under the extended model and the assumption that a collision-resistance function exists. | |
dc.format | text/html | |
dc.identifier | https://doi.org/10.3217/jucs-014-03-0416 | |
dc.identifier | https://lib.jucs.org/article/28955/ | |
dc.identifier.uri | https://openrepository.mephi.ru/handle/123456789/9618 | |
dc.language | en | |
dc.publisher | Journal of Universal Computer Science | |
dc.relation | info:eu-repo/semantics/altIdentifier/eissn/0948-6968 | |
dc.relation | info:eu-repo/semantics/altIdentifier/pissn/0948-695X | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.rights | J.UCS License | |
dc.source | JUCS - Journal of Universal Computer Science 14(3): 416-440 | |
dc.subject | authenticated key agreement | |
dc.subject | unknown key-share resilience | |
dc.subject | bilateral unknown key-share resilience | |
dc.subject | the Bellare-Rogaway model | |
dc.title | Bilateral Unknown Key-Share Attacks in Key Agreement Protocols | |
dc.type | Research Article |