Paper 2013/139
Rethinking Definitions of Security for Session Key Agreement
Wesley George and Charles Rackoff
Abstract
We consider session key agreement (SKA) protocols operating in a public key infrastructure, with pre-specified peers, that take no session ID as input, and output only a session key. Despite much work on SKA, we argue that there is no good definition of security for this (very natural) protocol syntax. The difficulty is that in this setting the adversary may not be able to tell which processes share a key, and thus which session keys may be revealed without trivializing the security condition. We consider security against adversaries that control all network traffic, can register arbitrary public keys, and can retrieve session keys. We do not attempt to mitigate damage from hardware failures, such as session-state compromise, as we aim to improve our understanding of this simpler setting. We give two natural but substantially different game based definitions of security and prove that they are equivalent. Such proofs are rare for SKA. The bulk of this proof consists of showing that, for secure protocols, only compatible processes can be made to share a key. This property is very natural but surprisingly subtle. For comparison, we give a version of our definition in which processes output session IDs and we give strong theorems relating these two types of definitions.
Note: A very similar version of this paper was submitted to and rejected from TCC 2011 and TCC 2012. We had hoped to quickly create a revised version, but since we didn’t, we present this version as is.
Metadata
- Available format(s)
- Category
- Foundations
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Key ExchangeDefinitionsPublic Key Infrastructure
- Contact author(s)
- wgeorge @ cs toronto edu
- History
- 2013-03-12: received
- Short URL
- https://ia.cr/2013/139
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/139, author = {Wesley George and Charles Rackoff}, title = {Rethinking Definitions of Security for Session Key Agreement}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/139}, year = {2013}, url = {https://eprint.iacr.org/2013/139} }