Authenticated key exchange under bad randomness
We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attac...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2011
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7416 https://ink.library.smu.edu.sg/context/sis_research/article/8419/viewcontent/Authenticated_key_exchange_under_bad_randomness.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8419 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-84192023-08-21T01:37:00Z Authenticated key exchange under bad randomness YANG, Guomin DUAN, Shanshan WONG, Duncan S. TAN, Chik How WANG, Huaxiong We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks. We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomness situations respectively, and investigate the security of some widely used AKE protocols in these models by showing that they become insecure when the adversary is able to manipulate the randomness. On the positive side, we propose simple but generic methods to make AKE protocols secure in Reset-1 and Reset-2 models. The methods work in a modular way: first, we strengthen a widely used AKE protocol to achieve Reset-2 security, then we show how to transform any Reset-2 secure AKE protocol to a new one which also satisfies Reset-1 security. 2011-03-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7416 info:doi/10.1007/978-3-642-27576-0_10 https://ink.library.smu.edu.sg/context/sis_research/article/8419/viewcontent/Authenticated_key_exchange_under_bad_randomness.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authenticated Key Exchange Resettable Cryptography Bad Randomness Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Authenticated Key Exchange Resettable Cryptography Bad Randomness Information Security |
spellingShingle |
Authenticated Key Exchange Resettable Cryptography Bad Randomness Information Security YANG, Guomin DUAN, Shanshan WONG, Duncan S. TAN, Chik How WANG, Huaxiong Authenticated key exchange under bad randomness |
description |
We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks. We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomness situations respectively, and investigate the security of some widely used AKE protocols in these models by showing that they become insecure when the adversary is able to manipulate the randomness. On the positive side, we propose simple but generic methods to make AKE protocols secure in Reset-1 and Reset-2 models. The methods work in a modular way: first, we strengthen a widely used AKE protocol to achieve Reset-2 security, then we show how to transform any Reset-2 secure AKE protocol to a new one which also satisfies Reset-1 security. |
format |
text |
author |
YANG, Guomin DUAN, Shanshan WONG, Duncan S. TAN, Chik How WANG, Huaxiong |
author_facet |
YANG, Guomin DUAN, Shanshan WONG, Duncan S. TAN, Chik How WANG, Huaxiong |
author_sort |
YANG, Guomin |
title |
Authenticated key exchange under bad randomness |
title_short |
Authenticated key exchange under bad randomness |
title_full |
Authenticated key exchange under bad randomness |
title_fullStr |
Authenticated key exchange under bad randomness |
title_full_unstemmed |
Authenticated key exchange under bad randomness |
title_sort |
authenticated key exchange under bad randomness |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2011 |
url |
https://ink.library.smu.edu.sg/sis_research/7416 https://ink.library.smu.edu.sg/context/sis_research/article/8419/viewcontent/Authenticated_key_exchange_under_bad_randomness.pdf |
_version_ |
1779156897899741184 |