Paper 2006/252

On the Resilience of Key Agreement Protocols to Key Compromise Impersonation

Maurizio A. Strangio

Abstract

Key agreement protocols are a fundamental building block for ensuring authenticated and private communications between two parties over an insecure network. This paper focuses on key agreement protocols in the asymmetric authentication model, wherein parties hold a public/private key pair. In particular, we consider a type of known key attack called key compromise impersonation that may occur once the adversary has obtained the private key of an honest party. This attack represents a subtle threat that is often underestimated and difficult to counter. Several protocols are shown vulnerable to this attack despite their authors claiming the opposite. We also consider in more detail how three formal (complexity-theoretic based) models of distributed computing found in the literature cover such attacks.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Proceedings of the 3rd European PKI Workshop, EuroPKI06
Keywords
key compromise impersonationkey agreement protocol
Contact author(s)
strangio @ disp uniroma2 it
History
2006-07-24: received
Short URL
https://ia.cr/2006/252
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/252,
      author = {Maurizio A.  Strangio},
      title = {On the Resilience of Key Agreement Protocols to Key Compromise Impersonation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2006/252},
      year = {2006},
      url = {https://eprint.iacr.org/2006/252}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.