Cryptology ePrint Archive: Report 2014/241

A New Way to Prevent UKS Attacks Using Trusted Computing

Qianying Zhang and Shijun Zhao and Dengguo Feng

Abstract: UKS (unknown key-share) attacks are common attacks on Authenticated Key Exchange (AKE) protocols. We summarize two popular countermeasures against UKS attacks on implicitly authenticated key exchange protocols. The first one forces the CA to check the possession of private keys during registration, which is impractical for the CA. The second one adds identities in the derivation of the session key, which requires modifying the protocol which might have already been deployed in practice. By leveraging the key protection capability of hardware security chips such as TPM or TCM, we propose a new way to prevent UKS attacks that requires no check of possession of private keys and no addition of identities during the derivation of the session key. We modify the CK model to adapt protocols using hardware security chips. We then implement the KEA protocol once used in NSA, which is subject to UKS attacks, using TCM chips. Our implementation, called tKEA, is secure under our security model. To show the generality, we demonstrate that our new way can prevent UKS attacks on the MQV protocol.

Category / Keywords: UKS attacks, Authenticated Key Exchange, Trusted Computing, KEA, CK model

Date: received 5 Apr 2014, last revised 18 Apr 2014, withdrawn 23 Nov 2016

Contact author: zqyzsj at gmail com

Available format(s): (-- withdrawn --)

Version: 20161123:080304 (All versions of this report)

Short URL:

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]