210 likes | 290 Vues
This paper proposes a secure cross-realm key exchange scheme using a password-based server-aided protocol. The model addresses passive and active attacks, session key misuse, secret leakage, and adversary control scenarios. The proposed scheme involves key generation, encryption, decryption, and utilizes public and private key information for clients and servers. The model aims to prevent undetectable online dictionary attacks, ephemeral private key leakage, and key compromise impersonation.
E N D
Cross-Realm Password-BasedServer Aided Key Exchange Source: WISA 2010, LNCS 6513, pp. 322–336, 2011(0) Author: KazukiYoneyama Presenter: Li-Tzu Chang
Outline • Introduction • New Model: Cross-Realm PSAKE Security • Proposed Scheme • Conclusion
Introduction • YB scheme • Secure Cross-Realm C2C-PAKE Protocol, 2006,(27) • WZ scheme • A New Security Model for Cross-Realm C2C-PAKE Protocol, 2007,(1)
Outline • Introduction • New Model: Cross-Realm PSAKE Security • Proposed Scheme • Conclusion
New Model • Execute( ) : • This query models passive attacks. • The output of this query consists of messages that were exchanged during the honest execution of the protocol among .
New Model • SendClient(Ul,m) : • This query models active attacks against a client. • The output of this query consists of the message that the client instance Ulwould generate on receipt of message m.
New Model • SendServer(Sl,m) : • This query models active attacks against servers. • The output of this query consists of the message that the server instance Slwould generate on receipt of message m.
New Model • SessionReveal(Ul) : • This query models the misuse of session keys. • The output of this query consists of the session key held by the client instance Ulif the session is completed for Ul. Otherwise, return ⊥.
New Model • StaticReveal(P) : • This query models leakage of the static secret of P • (i.e., the password between the client and the corresponding server, or the private information for the server). • The output of this query consists of the static secret of P.
New Model • EphemeralReveal(Pl) : • This query models leakage of all session-specific information (ephemeral key) used by Pl. • The output of this query consists of the ephemeral key of the instance Pl.
New Model • EstablishParty(Ul, pwU) : • This query models the adversary to register a static secret pwUon behalf of a client. • In this way the adversary totally controls that client. • Clients against whom the adversary did not issue this query are called honest.
New Model • Test(Ul) : • This query does not model the adversarial ability, but in distinguishability of the session key. • At the beginning a hidden bit b is chosen. • If no session key for the client instance Ulis defined, then return the undefined symbol ⊥. • Otherwise, • if b = 1, return the session key for the client instance Ul • if b = 0, a random key from the same space.
New Model • TestPassword(U, pw) : • This query does not model the adversarial ability, but no leakage of the password. • If the guessed password pw is just the same as the client U’s password pw, then return 1. • Otherwise, return 0. Note that, the adversary can only one TestPassword query at any time during the experiment.
Outline • Introduction • New Model: Cross-Realm PSAKE Security • Proposed Scheme • Conclusion
Proposed Scheme • p, q : • thelarge primes such that p = 2q + 1 • A,B ∈ U : • the identities of two clients in two different realms • SA,SB ∈ S: • the identities of their corresponding servers respectively.
Proposed Scheme • Gen(1k) : • key generation algorithm • Encpk(m; ω) : • encryption algorithm of a message m using a public key pkand randomness ω • Decsk(c) : • decryption algorithm of a cipher-text c using a private key sk.
Proposed Scheme • Public information : • G, g, p,H1,H2 • Long-term secret of clients : • pwAfor A and pwBfor B • Long-term secret of servers : • (pwA, skSA) for SA and (pwB, skSB) for SB
Outline • Introduction • New Model: Cross-Realm PSAKE Security • Proposed Scheme • Conclusion
UDonDA: undetectable on-line dictionary attacks LEP: leakage of ephemeral private keys of servers KCI: key-compromise impersonation Conclusion Where P denote the number of moves of a secure 2-party PAKE.