Paper 2024/324

Under What Conditions Is Encrypted Key Exchange Actually Secure?

Jake Januzelli, Oregon State University
Lawrence Roy, Aarhus University
Jiayu Xu, Oregon State University
Abstract

A Password-Authenticated Key Exchange (PAKE) protocol allows two parties to agree upon a cryptographic key, in the setting where the only secret shared in advance is a low-entropy password. The standard security notion for PAKE is in the Universal Composability (UC) framework. In recent years there have been a large number of works analyzing the UC-security of Encrypted Key Exchange (EKE), the very first PAKE protocol, and its One-encryption variant (OEKE), both of which compile an unauthenticated Key Agreement (KA) protocol into a PAKE. In this work, we present a comprehensive and thorough study of the UC-security of both EKE and OEKE in the most general setting and using the most efficient building blocks: 1. We show that among the seven existing results on the UC-security of (O)EKE, six are flawed; 2. We show that for (O)EKE to be UC-secure, the underlying KA protocol needs to satisfy the properties of strong pseudorandomness, pseudorandom non-malleability, and collision resistance, all of which are missing in existing works; 3. We give UC-security proofs for EKE and OEKE using Programmable-Once Random Function (POPF), which is the most efficient instantiation to date and is around 4 times faster than the standard instantiation using Ideal Cipher (IC). Our results in particular allow for PAKE constructions from post-quantum KA protocols such as Kyber. We also give a security analysis of POPF in a new composition framework called almost UC, which we believe is interesting in its own right.

Note: Add funding sources

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
key exchangePAKEuniversal composability
Contact author(s)
januzelj @ oregonstate edu
ldr709 @ gmail com
xujiay @ oregonstate edu
History
2024-03-09: revised
2024-02-25: received
See all versions
Short URL
https://ia.cr/2024/324
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/324,
      author = {Jake Januzelli and Lawrence Roy and Jiayu Xu},
      title = {Under What Conditions Is Encrypted Key Exchange Actually Secure?},
      howpublished = {Cryptology ePrint Archive, Paper 2024/324},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/324}},
      url = {https://eprint.iacr.org/2024/324}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.