Paper 2024/1384
Password-Protected Key Retrieval with(out) HSM Protection
Abstract
Password-protected key retrieval (PPKR) enables users to store and retrieve high-entropy keys from a server securely. The process is bootstrapped from a human-memorizable password only, addressing the challenge of how end-users can manage cryptographic key material. The core security requirement is protection against a corrupt server, which should not be able to learn the key or offline- attack it through the password protection. PPKR is deployed at a large scale with the WhatsApp Backup Protocol (WBP), allowing users to access their encrypted messaging history when switching to a new device. Davies et al. (Crypto’23) formally analyzed the WBP, proving that it satisfies most of the desired security. The WBP uses the OPAQUE protocol for password-based key exchange as a building block and relies on the server using a hardware security module (HSM) for most of its protection. In fact, the security analysis assumes that the HSM is incorruptible – rendering most of the heavy cryptography in the WBP obsolete. In this work, we explore how provably secure and efficient PPKR can be built that either relies strongly on an HSM – but then takes full advantage of that – or requires less trust assumption for the price of more advanced cryptography. To this end, we expand the definitional work by Davies et al. to allow the analysis of PPKR with fine-grained HSM corruption, such as leakage of user records or attestation keys. For each scenario, we aim to give minimal PPKR solutions. For the strongest corruption setting, namely a fully corrupted HSM, we propose a protocol with a simpler design and better efficiency than the WBP. We also fix an attack related to client authentication that was identified by Davies et al.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. 31st ACM Conference on Computer and Communications Security (ACM CCS 2024)
- DOI
- https://doi.org/10.1145/3658644.3690358
- Keywords
- Password-based CryptographyOPRFSecure MessagingUniversal Composability
- Contact author(s)
-
sebastian faller @ ibm com
tobias handirk @ uni-wuppertal de
juliahesse2 @ gmail com
horvath @ uni-wuppertal de
anja lehmann @ hpi de - History
- 2024-09-04: approved
- 2024-09-03: received
- See all versions
- Short URL
- https://ia.cr/2024/1384
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1384, author = {Sebastian Faller and Tobias Handirk and Julia Hesse and Máté Horváth and Anja Lehmann}, title = {Password-Protected Key Retrieval with(out) {HSM} Protection}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1384}, year = {2024}, doi = {https://doi.org/10.1145/3658644.3690358}, url = {https://eprint.iacr.org/2024/1384} }