Filters








182 Hits in 8.3 sec

Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy [chapter]

Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Gonzalez Nieto
2011 Lecture Notes in Computer Science  
2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel Abstract.  ...  We propose a new variant of JFK that avoids the identified DoS vulnerability and provides perfect forward secrecy even under the DDH assumption, achieving the full security promised by the JFK protocol  ...  The main technique for achieving DoS-resilience in JFK is the reuse of ephemeral public keys, but this comes at the obvious expense of perfect forward secrecy. Smith et al.  ... 
doi:10.1007/978-3-642-25578-6_27 fatcat:etkftrsparcibk4lgckhfnaa64

Internet of medical things: Prospects, challenges and future research directions

Abraham Isiaho, Kelvin Kabeti Omieno
2022 Global Journal of Engineering and Technology Advances  
As such, we offer some suggestions for the requirements of an ideal security technique that will not only be efficient but also provably secure.  ...  To curb this, numerous schemes have been put forward by various researchers over the recent past. In this paper, we provide an extensive review of these schemes in an effort to identify any gaps.  ...  This protocol is shown to offer perfect forward secrecy and resistance to the key compromise, impersonation and session-specific temporary information attack.  ... 
doi:10.30574/gjeta.2022.12.1.0108 fatcat:sljpk2atojbn7lvzhhrmnzo5r4

On the Security of Authenticated Group Key Agreement Protocols

Suman Bala, Gaurav Sharma, Hmani Bansal, Tarunpreet Bhatia
2019 Scalable Computing : Practice and Experience  
The group key agreement protocol enables to derive a shared session key for the remote members to communicate securely.  ...  Additionally, the protocol presented by Tan is also ESL-insecure. We also present a fix to the Tan's protocol to make it secure.  ...  The improved security model which addresses the forward secrecy and key compromise impersonation resilience (KCIR) for GKA protocols to take into account authenticated key exchange (AKE) security and mutual  ... 
doi:10.12694/scpe.v20i1.1440 fatcat:52dy6kz66zehvg6prkgvj5dslq

More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema [article]

Paul Rösler, Christian Mainka, Jörg Schwenk
2017 IACR Cryptology ePrint Archive  
We additionally show that strong security properties, such as Future Secrecy which is a core part of the one-to-one communication in the Signal protocol, do not hold for its group communication.  ...  To approach an investigation of group instant messaging protocols, we first provide a comprehensive and realistic security model.  ...  We thank Tibor Jager, Julian Loss, Moxie Marlinspike, the Threema Security Team, the CCS 2017, and EuroS&P 2018 reviewers for their helpful comments and fruitful discussions.  ... 
dblp:journals/iacr/RoslerMS17 fatcat:tclwq6l2mjfv7lxp6ddu6nnvzu

Provable Privacy Preserving Authentication Solution for Internet of Things Environment

Bander A. Alzahrani, Khalid Mahmood
2021 IEEE Access  
We analyze the proposed protocol informally which clearly shows that the proposed protocol offers the perfect forward secrecy, device anonymity and untraceability and also resists the desynchronization  ...  Therefore, it has become a foremost need to design such authentication protocol which can make the secure communication among IoT components.  ...  Gope and Sikadar [11] presented a key agreement protocol for IoT devices. However, their protocol is vulnerable to desynchronization attack and inefficient to offer perfect forward secrecy.  ... 
doi:10.1109/access.2021.3086735 fatcat:vhkw4tm5ozeclortaesumxhbai

LURK: Server-Controlled TLS Delegation [article]

Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan
2020 IACR Cryptology ePrint Archive  
Finally, we comprehensively analyze how our designs balance (provable) security and competitive performance. 6 Since TLS 1.2 RSA mode does not ensure forward secrecy, placing a mediating party in between  ...  By design, TLS (Transport Layer Security) is a 2-party, endto-end protocol.  ...  We included this mechanism in LURK in RSA mode to aid the enforcing of (channel security with) perfect forward secrecy.  ... 
dblp:journals/iacr/BoureanuMPAMFM20 fatcat:dglpuwpyvvc6xjo4xvsnuyblri

Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal [chapter]

Cas Cremers, Michèle Feltz
2012 Lecture Notes in Computer Science  
We show that it is possible to achieve perfect forward secrecy in two-message or one-round key exchange (KE) protocols that satisfy even stronger security properties than provided by the extended Canetti-Krawczyk  ...  In particular, we consider perfect forward secrecy in the presence of adversaries that can reveal ephemeral secret keys and the long-term secret keys of the actor of a session (similar to Key Compromise  ...  We would like to thank Colin Boyd for constructive comments on an earlier version of this work, and Li and Schäge [23] for pointing out a gap in the earlier proof.  ... 
doi:10.1007/978-3-642-33167-1_42 fatcat:puq2mzsvfbaolaycemnkhvqxoi

Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal

Cas Cremers, Michèle Feltz
2013 Designs, Codes and Cryptography  
We show that it is possible to achieve perfect forward secrecy in two-message or one-round key exchange (KE) protocols that satisfy even stronger security properties than provided by the extended Canetti-Krawczyk  ...  In particular, we consider perfect forward secrecy in the presence of adversaries that can reveal ephemeral secret keys and the long-term secret keys of the actor of a session (similar to Key Compromise  ...  We would like to thank Colin Boyd for constructive comments on an earlier version of this work, and Li and Schäge [23] for pointing out a gap in the earlier proof.  ... 
doi:10.1007/s10623-013-9852-1 fatcat:msixyv5ojzafnogois5kqix2z4

AN EFFICIENT TWO-SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES

Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta
2018 Jordanian Journal of Computers and Information Technology  
To achieve this, there is a need for a robust authentication mechanism. Towards the solution, a number of single server authenticated key agreement protocols have been reported recently.  ...  The formal verification of the proposed protocol using Automated Validation of Internet Security Protocols and Applications (AVISPA) proofs that it is provably secure.  ...  Therefore, we can conclude that our scheme is resilient against stolen-verifier attacks. Claim 12: Supports forward secrecy.  ... 
doi:10.5455/jjcit.71-1513237171 fatcat:jostmwzqa5gmxl32ebkxh2soqy

ANCHOR: logically-centralized security for Software-Defined Networks [article]

Diego Kreutz and Jiangshan Yu and Fernando M. V. Ramos and Paulo Esteves-Verissimo
2018 arXiv   pre-print
Essential security mechanisms provided by anchor include reliable entropy and resilient pseudo-random generators, and protocols for secure registration and association of SDN devices.  ...  To show the effectiveness of the concept, we focus on 'security' in this paper: we identify the current security gaps in SDNs and we populate the architecture middleware with the appropriate security mechanisms  ...  As mentioned previously, this key update is used to provide perfect forward secrecy (PFS).  ... 
arXiv:1711.03636v4 fatcat:kj36szj455anrg4dfjlfpuq5vi

Post-Quantum Forward-Secure Onion Routing [chapter]

Satrajit Ghosh, Aniket Kate
2015 Lecture Notes in Computer Science  
Recently, Goldberg, Stebila and Ustaoglu [24] formalized the OR key agreement security by introducing the concept of one-way authenticated key exchange (1W-AKE), and designed a provably secure 1W-AKE protocol  ...  The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this purpose.  ...  Bose Centre for Cryptology and Security, ISI Kolkata.  ... 
doi:10.1007/978-3-319-28166-7_13 fatcat:67hl35pjhzenxmfs2irtnotku4

Identity-Concealed Authenticated Encryption and Key Exchange

Yunlei Zhao
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
key exchange (CAKE) and unilateral CAKE (UCAKE).  ...  We then present the security definitional framework for higncryption, and a conceptually simple (yet carefully designed) protocol construction.  ...  security properties in reality, like unknown key share (UKS), key compromise impersonation (KCI), concurrent non-malleability (CNM), perfect forward security (PFS), strong resilience to secrecy exposure  ... 
doi:10.1145/2976749.2978350 dblp:conf/ccs/Zhao16 fatcat:pyzgs3ltoncpvkzzldwif3yqjm

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach

Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet
2017 2017 IEEE European Symposium on Security and Privacy (EuroS&P)  
We demonstrate our methodology by implementing and analyzing a variant of the popular Signal Protocol with only minor differences.  ...  We propose a novel methodology that allows protocol designers, implementers, and security analysts to collaboratively verify a protocol using automated tools.  ...  If pre-keys are not signed, then the protocol only offers weak forward secrecy with respect to long-term key leakage.  ... 
doi:10.1109/eurosp.2017.38 dblp:conf/eurosp/KobeissiBB17 fatcat:jc3mdwujmzd2rhtzd3262sn2ca

ANCHOR

Diego Kreutz, Jiangshan Yu, Fernando M. V. Ramos, Paulo Esteves-Verissimo
2019 ACM Transactions on Privacy and Security  
ANCHOR: logically-centralized security for Software-Defined Networks 3 inherit the desired properties; (d) populate the middleware with the appropriate mechanisms and protocols to enforce the desired  ...  Moreover, the proposed architecture only requires symmetric key cryptography. This not only ensures a very high performance, but also makes the system secure against attacks by a quantum computer.  ...  in order to fill those gaps, and achieve a logically-centralized security architecture that is reliable and highly efficient, post-quantum secure, and provides perfect forward secrecy and post-compromise  ... 
doi:10.1145/3301305 fatcat:ekq3vhfngzaw5n2t46mtxiowhu

A quantum key distribution protocol for rapid denial of service detection

Alasdair B. Price, John G. Rarity, Chris Erven
2020 EPJ Quantum Technology  
We introduce a quantum key distribution protocol designed to expose fake users that connect to Alice or Bob for the purpose of monopolising the link and denying service.  ...  such as AES-GCM being keyed with quantum devices.  ...  Authors' contributions ABP identified the denial of service attack and developed the BB84-AES protocol along with its variants.  ... 
doi:10.1140/epjqt/s40507-020-00084-6 fatcat:6nmrovsberaldjnip4fx3yueby
« Previous Showing results 1 — 15 out of 182 results