Paper 2024/1384

Password-Protected Key Retrieval with(out) HSM Protection

Sebastian Faller, IBM Research - Zurich, ETH Zurich
Tobias Handirk, University of Wuppertal
Julia Hesse, IBM Research - Zurich
Máté Horváth, University of Wuppertal
Anja Lehmann, Hasso-Plattner-Institute, University of Potsdam
Abstract

Password-protected key retrieval (PPKR) enables users to store and retrieve high-entropy keys from a server securely. The process is bootstrapped from a human-memorizable password only, addressing the challenge of how end-users can manage cryptographic key material. The core security requirement is protection against a corrupt server, which should not be able to learn the key or offline- attack it through the password protection. PPKR is deployed at a large scale with the WhatsApp Backup Protocol (WBP), allowing users to access their encrypted messaging history when switching to a new device. Davies et al. (Crypto’23) formally analyzed the WBP, proving that it satisfies most of the desired security. The WBP uses the OPAQUE protocol for password-based key exchange as a building block and relies on the server using a hardware security module (HSM) for most of its protection. In fact, the security analysis assumes that the HSM is incorruptible – rendering most of the heavy cryptography in the WBP obsolete. In this work, we explore how provably secure and efficient PPKR can be built that either relies strongly on an HSM – but then takes full advantage of that – or requires less trust assumption for the price of more advanced cryptography. To this end, we expand the definitional work by Davies et al. to allow the analysis of PPKR with fine-grained HSM corruption, such as leakage of user records or attestation keys. For each scenario, we aim to give minimal PPKR solutions. For the strongest corruption setting, namely a fully corrupted HSM, we propose a protocol with a simpler design and better efficiency than the WBP. We also fix an attack related to client authentication that was identified by Davies et al.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Major revision. 31st ACM Conference on Computer and Communications Security (ACM CCS 2024)
DOI
https://doi.org/10.1145/3658644.3690358
Keywords
Password-based CryptographyOPRFSecure MessagingUniversal Composability
Contact author(s)
sebastian faller @ ibm com
tobias handirk @ uni-wuppertal de
juliahesse2 @ gmail com
horvath @ uni-wuppertal de
anja lehmann @ hpi de
History
2024-09-04: approved
2024-09-03: received
See all versions
Short URL
https://ia.cr/2024/1384
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1384,
      author = {Sebastian Faller and Tobias Handirk and Julia Hesse and Máté Horváth and Anja Lehmann},
      title = {Password-Protected Key Retrieval with(out) {HSM} Protection},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1384},
      year = {2024},
      doi = {https://doi.org/10.1145/3658644.3690358},
      url = {https://eprint.iacr.org/2024/1384}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.