Paper 2011/688

Authenticated Key Exchange under Bad Randomness

Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, and Huaxiong Wang

Abstract

We initiate the formal study on authenticated key exchange (AKE) under bad randomness. This could happen when (1) an adversary compromises the randomness source and hence directly controls the randomness of each AKE session; and (2) the randomness repeats in different AKE sessions due to reset attacks. We construct two formal security models, Reset-1 and Reset-2, to capture these two bad randomness situations respectively, and investigate the security of some widely used AKE protocols in these models by showing that they become insecure when the adversary is able to manipulate the randomness. On the positive side, we propose simple but generic methods to make AKE protocols secure in Reset-1 and Reset-2 models. The methods work in a modular way: first, we strengthen a widely used AKE protocol to achieve Reset-2 security, then we show how to transform any Reset-2 secure AKE protocol to a new one which also satisfies Reset-1 security.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. FC 2011
Keywords
Authenticated Key ExchangeResettable CryptographyBad Randomness
Contact author(s)
tslyg @ nus edu sg
History
2011-12-23: received
Short URL
https://ia.cr/2011/688
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/688,
      author = {Guomin Yang and Shanshan Duan and Duncan S.  Wong and Chik How Tan and Huaxiong Wang},
      title = {Authenticated Key Exchange under Bad Randomness},
      howpublished = {Cryptology ePrint Archive, Paper 2011/688},
      year = {2011},
      note = {\url{https://eprint.iacr.org/2011/688}},
      url = {https://eprint.iacr.org/2011/688}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.