Paper 2016/1081
Attacks to a proxy-mediated key agreement protocol based on symmetric encryption
David Nuñez, Isaac Agudo, and Javier Lopez
Abstract
In this paper, we describe several attacks to the protocol by Nguyen et al. presented at ESORICS 2016, an authenticated key agreement protocol mediated by a proxy entity, restricted to only symmetric encryption primitives and intended for IoT environments. This protocol uses long-term weak secrets as intermediate values during encryption and decryption procedures, which implies that these can be used to encrypt and decrypt messages without knowing the corresponding secret keys. In our work, we show how access to weak secrets can break forward security and lead to key compromise impersonation attacks. Moreover, we demonstrate that this problem cannot be solved even if the affected user revokes his previous secret key and updates it to a new one. In addition, we explain how the choice of a keyed hash as part of the protocol makes it potentially vulnerable to length-extension attacks, depending on the choice of hash function. We illustrate this latter problem experimentally. Finally, we show how a combination of these exploits can be used to set up elaborate attack scenarios.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- key agreementproxy re-encryption
- Contact author(s)
- dnunez @ lcc uma es
- History
- 2016-11-21: received
- Short URL
- https://ia.cr/2016/1081
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/1081, author = {David Nuñez and Isaac Agudo and Javier Lopez}, title = {Attacks to a proxy-mediated key agreement protocol based on symmetric encryption}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/1081}, year = {2016}, url = {https://eprint.iacr.org/2016/1081} }