Cryptology ePrint Archive: Report 2015/486

How to detect unauthorised usage of a key

Jiangshan Yu and Mark Ryan and Cas Cremers

Abstract: Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device performing the crypto operations is free of malware. We explore ways in which some security guarantees can be achieved even if an attacker has succeeded in obtaining access to all the keys in a device, e.g. by exploiting software vulnerabilities. We develop a new protocol concept that allows the device owner to detect if another party is using the device’s long-term key. We achieve this by making it necessary for uses of the key to be inserted in an append-only log, which the device owner can interrogate. We propose a multi-device messaging protocol that exploits our concept to allow users to detect unauthorised usage of their device keys. We prove the main properties of our protocol using the Tamarin prover. The methods we introduce are not intended to replace existing methods used to keep keys safe (such as hardware devices or careful procedures). Rather, our methods provide a useful and effective additional layer of security.

Category / Keywords: applications / Key usage detection

Date: received 21 May 2015

Contact author: jxy223 at cs bham ac uk

Available format(s): PDF | BibTeX Citation

Version: 20150521:201012 (All versions of this report)

Short URL: ia.cr/2015/486

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]