Paper 2024/324
Under What Conditions Is Encrypted Key Exchange Actually Secure?
Abstract
A Password-Authenticated Key Exchange (PAKE) protocol allows two parties to agree upon a cryptographic key, in the setting where the only secret shared in advance is a low-entropy password. The standard security notion for PAKE is in the Universal Composability (UC) framework. In recent years there have been a large number of works analyzing the UC-security of Encrypted Key Exchange (EKE), the very first PAKE protocol, and its One-encryption variant (OEKE), both of which compile an unauthenticated Key Agreement (KA) protocol into a PAKE. In this work, we present a comprehensive and thorough study of the UC-security of both EKE and OEKE in the most general setting and using the most efficient building blocks: 1. We show that among the five existing results on the UC-security of (O)EKE using a general KA protocol, all are incorrect; 2. We show that for (O)EKE to be UC-secure, the underlying KA protocol needs to satisfy several additional security properties: though some of these are closely related to existing security properties, some are new, and all are missing from existing works on (O)EKE; 3. We give UC-security proofs for EKE and OEKE using Programmable-Once Public Function (POPF), which is the most efficient instantiation to date and is around 4 times faster than the standard instantiation using Ideal Cipher (IC). Our results in particular allow for PAKE constructions from post-quantum KA protocols such as Kyber. We also present a security analysis of POPF using a new, weakened notion of almost UC realizing a functionality, that is still sufficient for proving composed protocols to be fully UC-secure.
Note: Add funding sources
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- key exchangePAKEuniversal composability
- Contact author(s)
-
januzelj @ oregonstate edu
ldr709 @ gmail com
xujiay @ oregonstate edu - History
- 2024-10-11: last of 2 revisions
- 2024-02-25: received
- See all versions
- Short URL
- https://ia.cr/2024/324
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/324, author = {Jake Januzelli and Lawrence Roy and Jiayu Xu}, title = {Under What Conditions Is Encrypted Key Exchange Actually Secure?}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/324}, year = {2024}, url = {https://eprint.iacr.org/2024/324} }