Cryptology ePrint Archive: Report 2017/060

Zero Round-Trip Time for the Extended Access Control Protocol

Jacqueline Brendel and Marc Fischlin

Abstract: The Extended Access Control (EAC) protocol allows to create a shared cryptographic key between a client and a server. It is for instance referenced by the International Civil Aviation Organization for securing the communication between machine readable travel documents and terminals, and is also deployed on current German identity cards. Here we discuss how to enhance the EAC protocol by a so-called zero-round trip time (0RTT) mode. Through this mode the client can, without further interaction, immediately derive a new key from cryptographic material exchanged in previous executions. This makes the 0RTT mode attractive from an efficiency viewpoint such that the upcoming TLS 1.3 standard, for instance, will include its own 0RTT mode. Here we show that the EAC protocol can be augmented to support a 0RTT mode, too. Our proposed EAC+0RTT protocol is compliant with the basic EAC protocol and adds the 0RTT mode smoothly on top. We also prove the security of our proposal according to the common security model of Bellare and Rogaway in the multi-stage setting.

Category / Keywords: cryptographic protocols / zero-RTT protocols, authenticated key exchange, extended access control protocol,

Date: received 27 Jan 2017, last revised 27 Jan 2017

Contact author: jacqueline brendel at cryptoplexity de, marc fischlin@cryptoplexity de

Available format(s): PDF | BibTeX Citation

Version: 20170131:151751 (All versions of this report)

Short URL: ia.cr/2017/060

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]