Modeling key compromise impersonation attacks on group key exchange protocols


Autoria(s): Gorantla, Choudary; Boyd, Colin; Gonzalez Nieto, Juan Manuel
Data(s)

18/03/2009

Resumo

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/26156/

Publicador

Springer

Relação

http://eprints.qut.edu.au/26156/2/26156.pdf

DOI:10.1007/978-3-642-00468-1_7

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.

Direitos

Copyright 2009 Springer.

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080402 Data Encryption #080303 Computer System Security #cryptographic protocols #Group Key Exchange #Key Compromise Impersonation #Insider Attacks
Tipo

Conference Paper