Paper 2014/241
A New Way to Prevent UKS Attacks Using Trusted Computing
Qianying Zhang, Shijun Zhao, and Dengguo Feng
Abstract
UKS (unknown key-share) attacks are common attacks on Authenticated Key Exchange (AKE) protocols. We summarize two popular countermeasures against UKS attacks on implicitly authenticated key exchange protocols. The first one forces the CA to check the possession of private keys during registration, which is impractical for the CA. The second one adds identities in the derivation of the session key, which requires modifying the protocol which might have already been deployed in practice. By leveraging the key protection capability of hardware security chips such as TPM or TCM, we propose a new way to prevent UKS attacks that requires no check of possession of private keys and no addition of identities during the derivation of the session key. We modify the CK model to adapt protocols using hardware security chips. We then implement the KEA protocol once used in NSA, which is subject to UKS attacks, using TCM chips. Our implementation, called tKEA, is secure under our security model. To show the generality, we demonstrate that our new way can prevent UKS attacks on the MQV protocol.
Metadata
- Available format(s)
- -- withdrawn --
- Publication info
- Preprint. MINOR revision.
- Keywords
- UKS attacksAuthenticated Key ExchangeTrusted ComputingKEACK model
- Contact author(s)
- zqyzsj @ gmail com
- History
- 2016-11-23: withdrawn
- 2014-04-18: received
- See all versions
- Short URL
- https://ia.cr/2014/241
- License
-
CC BY