Comparing Sessionstatereveal and Ephemeralkeyreveal for Diffie-Hellman Protocols (extended Version)

dc.contributor.author Ustaoğlu, Berkant
dc.date.accessioned 2017-02-02T10:34:30Z
dc.date.available 2017-02-02T10:34:30Z
dc.date.issued 2009
dc.description This is an extended version that includes security arguments and more elaborate comparison. en_US
dc.description.abstract Both the ``eCK'' model, by LaMacchia, Lauter and Mityagin, and the ``CK01'' model, by Canetti and Krawczyk, address the effect of leaking session specific ephemeral data on the security of key establishment schemes. The CK01-adversary is given a \SessionStateReveal{} query to learn session specific private data defined by the protocol specification, whereas the eCK-adversary is equipped with an \RevealEphemeralKey{} query to access all ephemeral private input required to carry session computations. \SessionStateReveal{} \emph{cannot} be issued against the test session; by contrast \RevealEphemeralKey{} \emph{can} be used against the test session under certain conditions. On the other hand, it is not obvious how \RevealEphemeralKey{} compares to \SessionStateReveal{}. Thus it is natural to ask which model is more useful and practically relevant. While formally the models are not comparable, we show that recent analysis utilizing \SessionStateReveal{} and \RevealEphemeralKey{} have a similar approach to ephemeral data leakage. First we pinpoint the features that determine the approach. Then by examining common motives for ephemeral data leakage we conclude that the approach is meaningful, but does not take into account timing, which turns out to be critical for security. Lastly, for Diffie-Hellman protocols we argue that it is important to consider security when discrete logarithm values of the outgoing ephemeral public keys are leaked and offer a method to achieve security even if the values are exposed. en_US
dc.identifier.citation Ustaoğlu, B. (2009). Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version). Cryptology ePrint Archive, Report 2009/353. http://eprint.iacr.org/2009/353 en_US
dc.identifier.uri https://hdl.handle.net/11147/4784
dc.language.iso en en_US
dc.publisher International Association for Cryptologic Research en_US
dc.relation.ispartof Cryptology ePrint Archive en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Key agreement protocols en_US
dc.subject Leakage of ephemeral secrets en_US
dc.subject Diffie-Hellman assumption en_US
dc.subject HMQV en_US
dc.subject NAXOS' approach en_US
dc.title Comparing Sessionstatereveal and Ephemeralkeyreveal for Diffie-Hellman Protocols (extended Version) en_US
dc.type Article en_US
dspace.entity.type Publication
gdc.author.institutional Ustaoğlu, Berkant
gdc.author.yokid 102756
gdc.coar.access open access
gdc.coar.type text::journal::journal article
gdc.description.department İzmir Institute of Technology. Mathematics en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality N/A
gdc.description.volume Report 2009/353 en_US
gdc.description.wosquality N/A
gdc.identifier.wos WOS:000279343700014
gdc.index.type WoS
gdc.index.type Scopus
gdc.wos.citedcount 25
relation.isAuthorOfPublication.latestForDiscovery e58ceea7-82b9-4d8c-a531-02cb47780412
relation.isOrgUnitOfPublication.latestForDiscovery 9af2b05f-28ac-4012-8abe-a4dfe192da5e

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Name:
4784.pdf
Size:
356.61 KB
Format:
Adobe Portable Document Format
Description:
Makale

License bundle

Now showing 1 - 1 of 1
Loading...
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: