Cryptology ePrint Archive: Report 2015/486
How to detect unauthorised usage of a key
Jiangshan Yu and Mark Ryan and Cas Cremers
Abstract: Encryption is useful only if the decryption key has not been exposed to adversaries; in particular, it requires that the device performing the crypto operations is free of malware. We explore ways in which some security guarantees can be achieved even if an attacker has succeeded in obtaining access to all the keys in a device, e.g. by exploiting software vulnerabilities.
We develop a new protocol concept that allows the device owner to detect if another party is using the device’s long-term key. We achieve this by making it necessary for uses of the key to be inserted in an append-only log, which the device owner can interrogate. We propose a multi-device messaging protocol that exploits our concept to allow users to detect unauthorised usage of their device keys. We prove the main properties of our protocol using the Tamarin prover.
The methods we introduce are not intended to replace existing methods used to keep keys safe (such as hardware devices or careful procedures). Rather, our methods provide a useful and effective additional layer of security.
Category / Keywords: applications / Key usage detection
Date: received 21 May 2015
Contact author: jxy223 at cs bham ac uk
Available format(s): PDF | BibTeX Citation
Version: 20150521:201012 (All versions of this report)
Short URL: ia.cr/2015/486
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]