scispace - formally typeset
Open AccessBook ChapterDOI

Leakage-Resilient Authenticated Key Establishment Protocols

TLDR
In this paper, the authors review authenticated key establishment protocols from a different point of view, i.e., the relationship between information a client needs to possess (for authentication) and immunity to the respective leakage of stored secrets from a client side and a server side.
Abstract
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we review AKE protocols from a little bit different point of view, i.e. the relationship between information a client needs to possess (for authentication) and immunity to the respective leakage of stored secrets from a client side and a server side. Since the information leakage would be more conceivable than breaking down the underlying cryptosystems, it is desirable to enhance the immunity to the leakage. First and foremost, we categorize AKE protocols according to how much resilience against the leakage can be provided. Then, we propose new AKE protocols that have immunity to the leakage of stored secrets from a client and a server (or servers), respectively. And we extend our protocols to be possible for updating secret values registered in server(s) or password remembered by a client.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

A forward-secure digital signature scheme.

TL;DR: A digital signature scheme in which the public key is fixed but the secret signing key is updated at regular intervals so as to provide a forward security property: compromise of the current secret key does not enable an adversary to forge signatures pertaining to the past.
Journal ArticleDOI

LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links

TL;DR: This work proposes new handover procedures to be performed by mobile routers and by visiting mobile nodes based on leakage resilient-authenticated key establishment (LR-AKE) protocol, and evaluates the proposed handover procedure in terms of handover delay which affects the session continuity.
Book ChapterDOI

Big-Key Symmetric Encryption: Resisting Key Exfiltration

TL;DR: In this article, the subkey prediction lemma is used to give a good bound on an adversary's ability to guess a modest length subkey of a big-key, i.e., the bits of the big key found at random, specified locations, after the adversary has exfiltrated partial information about the bigkey.
Dissertation

Key establishment : proofs and refutations

TL;DR: It is shown that the partnership definition used in the three-party key distribution protocol of Bellare and Rogaway (1995) is flawed, which invalidates the proof for the 3PKD protocol and an improved protocol is presented with a new proof of security.
Journal Article

A framework for password-based authenticated key exchange

TL;DR: This paper presents a general framework for passwordbased authenticated key exchange protocols, in the common reference string model, based on the recently introduced notion of smooth projective hashing by Cramer and Shoup, and obtains a modular protocol that can be described using just three high-level cryptographic tools.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Random oracles are practical: a paradigm for designing efficient protocols

TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Proceedings ArticleDOI

Safeguarding cryptographic keys

TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem, 1 , 5 or the system master key and certain other keys in a DES cryptos system, 3 are so important that they present a dilemma.

HMAC: Keyed-Hashing for Message Authentication

TL;DR: This document describes HMAC, a mechanism for message authentication using cryptographic hash functions that can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in combination with a secret shared key.