QUT ePrints

Modeling key compromise impersonation attacks on group key exchange protocols

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.

[img] Submitted Version (PDF 231kB)
Administrators only | Request a copy from author

    View at publisher

    Abstract

    A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

    Impact and interest:

    10 citations in Scopus
    Search Google Scholar™

    Citation countsare sourced monthly from Scopus and Web of Science® citation databases.

    These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

    Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

    ID Code: 26156
    Item Type: Conference Paper
    Keywords: cryptographic protocols, Group Key Exchange, Key Compromise Impersonation, Insider Attacks
    DOI: 10.1007/978-3-642-00468-1_7
    ISBN: 9783642004674
    Subjects: Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > DATA FORMAT (080400) > Data Encryption (080402)
    Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)
    Divisions: Past > QUT Faculties & Divisions > Faculty of Science and Technology
    Past > Institutes > Information Security Institute
    Copyright Owner: Copyright 2009 Springer.
    Deposited On: 06 Jul 2009 15:00
    Last Modified: 17 Jul 2014 16:57

    Export: EndNote | Dublin Core | BibTeX

    Repository Staff Only: item control page