Authentication and key management automation in decentralized secure email and messaging via low-entropy secrets

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We revisit the problem of entity authentication in decentralized end-to-end encrypted email and secure messaging to propose a practical and self-sustaining cryptographic solution based on password-authenticated key exchange (PAKE). This not only allows users to authenticate each other via shared low-entropy secrets, e.g., memorable words, without a public key infrastructure or a trusted third party, but it also paves the way for automation and a series of cryptographic enhancements; improves security by minimizing the impact of human error and potentially improves usability. First, we study a few vulnerabilities in voice-based out-of-band authentication, in particular a combinatorial attack against lazy users, which we analyze in the context of a secure email solution. Next, we propose solving the problem of secure equality test using PAKE to achieve entity authentication and to establish a shared high-entropy secret key. Our solution lends itself to offline settings, compatible with the inherently asynchronous nature of email and modern messaging systems. The suggested approach enables enhancements in key management such as automated key renewal and future key pair authentications, multi-device synchronization, secure secret storage and retrieval, and the possibility of post-quantum security as well as facilitating forward secrecy and deniability in a primarily symmetric-key setting. We also discuss the use of auditable PAKEs for mitigating a class of online guess and abort attacks in authentication protocols.

Cite

CITATION STYLE

APA

Sandoval, I. V., Atashpendar, A., & Lenzini, G. (2020). Authentication and key management automation in decentralized secure email and messaging via low-entropy secrets. In ICETE 2020 - Proceedings of the 17th International Joint Conference on e-Business and Telecommunications (Vol. 3, pp. 167–179). SciTePress. https://doi.org/10.5220/0009834001670179

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free