Session-state reveal is stronger than ephemeral key reveal: Attacking the NAXOS authenticated key exchange protocol

N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In the paper "Stronger Security of Authenticated Key Exchange" [1, 2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model is suggested to be at least as strong as previous models for key exchange protocols. The model includes a new notion of an Ephemeral Key Reveal adversary query, which is claimed in e.g. [2,3, 4] to be at least as strong as the Session-state Reveal query. We show that Session-state Reveal is stronger than Ephemeral Key Reveal, implying that the eCK security model is incomparable to the CK model [5, 6]. In particular we show that the proposed NAXOS protocol from [1, 2] does not meet its security requirements if the Session-state Reveal query is allowed in the eCK model. We discuss the implications of our result for some related protocols proven correct in the eCK model, and discuss the interaction between Session-state Reveal and protocol transformations. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Cremers, C. J. F. (2009). Session-state reveal is stronger than ephemeral key reveal: Attacking the NAXOS authenticated key exchange protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5536 LNCS, pp. 20–33). https://doi.org/10.1007/978-3-642-01957-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free