Key-agreement protocol

In cryptography, a key-agreement protocol is a protocol whereby two (or more) parties generate a cryptographic key as a function of information provided by each honest party so that no party can predetermine the resulting value.[1] In particular, all honest participants influence the outcome. A key-agreement protocol is a specialisation of a key-exchange protocol.[2]

At the end of the agreement, all parties share the same key. A key-agreement protocol precludes undesired third parties from forcing a key choice on the agreeing parties. A secure key agreement can ensure confidentiality and data integrity[3] in communications systems, ranging from simple messaging applications to complex banking transactions.

Secure agreement is defined relative to a security model, for example the Universal Model.[2] More generally, when evaluating protocols, it is important to state security goals and the security model.[4] For example, it may be required for the session key to be authenticated. A protocol can be evaluated for success only in the context of its goals and attack model.[5] An example of an adversarial model is the Dolev-Yao model.

In many key exchange systems, one party generates the key, and sends that key to the other party;[6] the other party has no influence on the key.

Exponential key exchange

The first publicly known[6] public-key agreement protocol that meets the above criteria was the Diffie–Hellman key exchange, in which two parties jointly exponentiate a generator with random numbers, in such a way that an eavesdropper cannot feasibly determine what the resultant value used to produce a shared key is.

Exponential key exchange in and of itself does not specify any prior agreement or subsequent authentication between the participants. It has thus been described as an anonymous key agreement protocol.

Symmetric Key Agreement

Symmetric Key Agreement (SKA) is a method of key-agreement that uses solely symmetric cryptography and cryptographic hash functions as cryptographic primitives. It is related to Symmetric Authenticated Key Exchange.[7]

SKA may assume the use of initial shared secrets[7] or a trusted third party with whom the agreeing parties share a secret is assumed.[8] If no third party is present, then achieving SKA can be trivial: we assume that two parties share an initial secret and have tautologically achieved SKA.

SKA contrasts with key-agreement protocols that include techniques from asymmetric cryptography. For example, key encapsulation mechanisms.

The initial exchange of a shared key must be done in a manner that is private and integrity-assured. Historically, this was achieved by physical means, such as by using a trusted courier.

An example of a SKA protocol is the Needham-Schroeder Symmetric Key Protocol. It establishes a session key between two parties on the same network, using a server as a trusted third party. The original Needham-Schroeder protocol is vulnerable to a replay attack. Timestamps and nonces are included to fix this attack. It forms the basis for the Kerberos protocol.

Types of Secret Key Agreement

Boyd et al.[9] classify two-party key agreement protocols according to two criteria as follows:

  1. whether a pre-shared key already exists or not
  2. the method of generating the session key.

The pre-shared key may be shared between the two parties, or each party may share a key with a trusted third party. If there is no secure channel (as may be established via a pre-shared key), it is impossible to create an authenticated session key.[10]

The session key may be generated via: key transport, key agreement and hybrid. If there is no trusted third party, then the cases of key transport and hybrid session key generation are indistinguishable. SKA is concerned with protocols in which the session key is established using only symmetric primitives.

Authentication

Anonymous key exchange, like Diffie–Hellman, does not provide authentication of the parties, and is thus vulnerable to man-in-the-middle attacks.

A wide variety of cryptographic authentication schemes and protocols have been developed to provide authenticated key agreement to prevent man-in-the-middle and related attacks. These methods generally mathematically bind the agreed key to other agreed-upon data, such as the following:

  • Public/private key pairs
  • Shared secret keys
  • Passwords

Public keys

A widely used mechanism for defeating such attacks is the use of digitally signed keys that must be integrity-assured: if Bob's key is signed by a trusted third party vouching for his identity, Alice can have considerable confidence that a signed key she receives is not an attempt to intercept by Eve. When Alice and Bob have a public-key infrastructure, they may digitally sign an agreed Diffie–Hellman key, or exchanged Diffie–Hellman public keys. Such signed keys, sometimes signed by a certificate authority, are one of the primary mechanisms used for secure web traffic (including HTTPS, SSL or Transport Layer Security protocols). Other specific examples are MQV, YAK and the ISAKMP component of the IPsec protocol suite for securing Internet Protocol communications. However, these systems require care in endorsing the match between identity information and public keys by certificate authorities in order to work properly.

Hybrid systems

Hybrid systems use public-key cryptography to exchange secret keys, which are then used in a symmetric-key cryptography systems. Most practical applications of cryptography use a combination of cryptographic functions to implement an overall system that provides all of the four desirable features of secure communications (confidentiality, integrity, authentication, and non-repudiation).

Passwords

Password-authenticated key agreement protocols require the separate establishment of a password (which may be smaller than a key) in a manner that is both private and integrity-assured. These are designed to resist man-in-the-middle and other active attacks on the password and the established keys. For example, DH-EKE, SPEKE, and SRP are password-authenticated variations of Diffie–Hellman.

Other tricks

If one has an integrity-assured way to verify a shared key over a public channel, one may engage in a Diffie–Hellman key exchange to derive a short-term shared key, and then subsequently authenticate that the keys match. One way is to use a voice-authenticated read-out of the key, as in PGPfone. Voice authentication, however, presumes that it is infeasible for a man-in-the-middle to spoof one participant's voice to the other in real-time, which may be an undesirable assumption. Such protocols may be designed to work with even a small public value, such as a password. Variations on this theme have been proposed for Bluetooth pairing protocols.

In an attempt to avoid using any additional out-of-band authentication factors, Davies and Price proposed the use of the interlock protocol of Ron Rivest and Adi Shamir, which has been subject to both attack and subsequent refinement.

See also

References

  1. ^ Menezes, A.; Oorschot, P. van; Vanstone, S. (1997). Handbook of Applied Cryptography (5th ed.). CRC Press. ISBN 0-8493-8523-7.
  2. ^ a b Canetti, Ran; Krawczyk, Hugo (6 May 2001). "Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels". Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology. Springer-Verlag: 453–474. ISBN 978-3-540-42070-5.
  3. ^ Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo (23 May 1998). "A modular approach to the design and analysis of authentication and key exchange protocols (Extended abstract)". Proceedings of the thirtieth annual ACM symposium on Theory of computing - STOC '98. Association for Computing Machinery. pp. 419–428. doi:10.1145/276698.276854. ISBN 0-89791-962-9.
  4. ^ Gollmann, D. (6 May 1996). "What do we mean by entity authentication?". Proceedings 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society. pp. 46–54. doi:10.1109/SECPRI.1996.502668. ISBN 978-0-8186-7417-4.
  5. ^ Katz, Jonathan; Lindell, Yehuda (2021). Introduction to modern cryptography (Third ed.). Boca Raton London New York: CRC Press Taylor & Francis Group. p. 49. ISBN 978-0815354369.
  6. ^ a b See Diffie–Hellman key exchange for a more complete history of both the secret and public development of public-key cryptography.
  7. ^ a b Boyd, Colin; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise (2021). "Symmetric Key Exchange with Full Forward Security and Robust Synchronization". Advances in Cryptology – ASIACRYPT 2021. Lecture Notes in Computer Science. Vol. 13093. Springer International Publishing. pp. 681–710. doi:10.1007/978-3-030-92068-5_23. hdl:11250/2989781. ISBN 978-3-030-92067-8.
  8. ^ Pagnia, Henning; Gaertner, Felix (1999). "On the impossibility of fair exchange without a trusted third party". Echnical Report TUD-BS-1999-02: 1–15.
  9. ^ Boyd, Colin; Mathuria, Anish; Stebila, Douglas (2020). Protocols for Authentication and Key Establishment. Information Security and Cryptography. doi:10.1007/978-3-662-58146-9. ISBN 978-3-662-58145-2.
  10. ^ Boyd, C. (June 1993). "Security architectures using formal methods" (PDF). IEEE Journal on Selected Areas in Communications. 11 (5): 694–701. doi:10.1109/49.223872.

Read other articles:

Diagram yang menunjukkan embarang Jalan, jalur kereta api, atau kanal biasanya ditinggikan ke atas embarang atau pelengsengan yang terbuat dari tanah yang dipadatkan (biasanya berbahan dasar tanah liat atau batu) untuk menghindari perubahan ketinggian yang diperlukan oleh medan, alternatifnya adalah dengan melakukan perubahan ketinggian yang tidak dapat diterima atau jalan memutar. untuk mengikuti kontur. Penebangan digunakan untuk tujuan yang sama dimana lahan awalnya lebih tinggi dari yang ...

 

Vaccination rates for preschool-aged children from 1967–2012, with Vaccines for Children program era marked. Immunization rates for all pre-school aged children increased to at least 90% for most vaccines in the 1990s. It is difficult to discern if this increase was directly caused by the VFC program. (Abbreviations: DTP/DTaP = diphtheria, tetanus, pertussis or diphtheria, tetanus, acellular pertussis; MMR = measles, mumps, and rubella; Hib = Haemophilus influenzae type b; Hep B = hepatiti...

 

Hollywood Creative AllianceTanggal pendirian2016PendiriScott MenzelTujuanKritik filmLokasiLos Angeles, CaliforniaCEOScott MenzelSitus webhollywoodcreative.orgNama sebelumnyaHollywood Critics Association Hollywood Creative Alliance (HCA) — sebelumnya, hingga 2019, dikenal sebagai Los Angeles Online Film Critics Society (LAOFCS) — adalah sebuah organisasi kritikus film di Los Angeles, California. Pada Agustus 2021, HCA mengadakan 1st Hollywood Critics Association TV Awards pertama mereka. ...

Gonstanza dari AragonPermaisuri HungariaPeriode1198–1204Permaisuri JermanPeriode9 Desember 1212/5 Juli 1215 – 23 April 1220Permaisuri Romawi SuciPeriode22 November 1220 – 23 Juni 1222Penobatan22 November 1220 (Roma)Informasi pribadiKelahiran1179Kematian23 Juni 1222 – 1179; umur -44–-43 tahunItaliaWangsaBarcelonaAyahAlfonso II dari AragonIbuSancha dari KastiliaPasanganImre dari HungariaFriedrich II, Kaisar Romawi SuciAnakLászló III dari HungariaHeinrich VII dari Jerman...

 

Meja rias (ca. 1815-1830) Meja rias adalah meja yang dirancang khusus untuk bersolek (berpakaian, merias wajah, dan perawatan pribadi lainnya), [1] dimaksudkan untuk kamar tidur atau kamar kerja . [2] Sejarah Adlin menelusuri sejarah kesombongan dari kotak penyimpanan kotak kosmetik yang dikenal sangat lama (wadah penyimpanan salep, cat wajah, parfum digali dari makam seorang juru tulis Mesir Reniseneb, abad ke-15 SM ). [3] Ketertarikan baru pada perhiasan diri selama ...

 

This article uses bare URLs, which are uninformative and vulnerable to link rot. Please consider converting them to full citations to ensure the article remains verifiable and maintains a consistent citation style. Several templates and tools are available to assist in formatting, such as reFill (documentation) and Citation bot (documentation). (September 2022) (Learn how and when to remove this template message) This article's lead section may be too short to adequately summarize the key poi...

Ankylosaurid dinosaur genus from the Late Cretaceous Period Not to be confused with Ankylosuchus. AnkylosaurusTemporal range: Late Cretaceous (Maastrichtian), 68–66 Ma PreꞒ Ꞓ O S D C P T J K Pg N ↓ Cast of Ankylosaurus skull (AMNH 5214) in front view, Museum of the Rockies Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Chordata Clade: Dinosauria Clade: †Ornithischia Clade: †Thyreophora Clade: †Ankylosauria Family: †Ankylosauridae Subfamily: †A...

 

Запрос «Гусь» перенаправляется сюда; для терминов «Гусь» и «Гуси» см. также другие значения. Гуси Домашний гусь (Эмденский) Научная классификация Домен:ЭукариотыЦарство:ЖивотныеПодцарство:ЭуметазоиБез ранга:Двусторонне-симметричныеБез ранга:ВторичноротыеТип:Хордовы...

 

American pole vaulter Katie MoonNageotte at the 2019 Birmingham Grand PrixPersonal informationBirth nameKathryn Elizabeth Nageotte (/nəˈʒɒt/ nə-ZHOT)Born (1991-06-13) June 13, 1991 (age 32)Lakewood, Ohio, U.S.Height5 ft 8 in (173 cm)Weight135 lb (61 kg)WebsiteKatie Nageotte at AthleteBizSportCountryUnited StatesSportTrack and fieldEventPole vaultCollege teamAshland University '13University of DaytonTeamNikeTurned pro2013Coached byBrad WalkerAchievements...

Ця стаття потребує додаткових посилань на джерела для поліпшення її перевірності. Будь ласка, допоможіть удосконалити цю статтю, додавши посилання на надійні (авторитетні) джерела. Зверніться на сторінку обговорення за поясненнями та допоможіть виправити недоліки. Мат...

 

Opera Eight Songs for a Mad KingMonodrama by Peter Maxwell DaviesLeigh Melrose performing the work at the Nordland Music Festival in Bodø, 2014LibrettistRandolph StowBased onwords by George IIIPremiere22 April 1969 (1969-04-22)London Eight Songs for a Mad King is a monodrama by Sir Peter Maxwell Davies with a libretto by Randolph Stow, based on words of George III. The work was written for the South-African actor Roy Hart and the composer's ensemble, the Pierrot Players. It wa...

 

English actress (born 1985) Jaime WinstoneWinstone in 2010BornJaime Margaret Winstone (1985-05-06) 6 May 1985 (age 39)London, EnglandOccupationActressYears active2004–presentSpouse James Suckling ​(m. 2023)​Children1ParentRay WinstoneRelativesLois Winstone (sister) Jaime Margaret Winstone (born 6 May 1985) is an English actress, best known for her roles in Kidulthood, Dead Set, After Hours and her portrayal of Barbara Windsor in Babs. Early life and ed...

T-62 T-62 (Objekt 166) Allgemeine Eigenschaften Besatzung 4 (Kommandant, Fahrer, Richtschütze, Ladeschütze) Länge 9,33 m (mit Kanone in 12-Uhr-Stellung) Breite 3,30 m Höhe 2,39 m Masse 40 t Panzerung und Bewaffnung Panzerung 242 mm RHA Hauptbewaffnung 1 × 115-mm-Glattrohrkanone U-5TS (40 Geschosse) Sekundärbewaffnung 1 × 7,62-mm-MG PKT (achsparallel, 2500 Patronen) und 1 × 12,7-mm-MG DShKM (Fla-MG, 500 Patronen) Beweglichkeit Antrieb V12-Dieselmotor W-55W580 PS (427 kW) Fed...

 

William Powell William Horatio Powell[1] (Pittsburgh, 29 luglio 1892 – Palm Springs, 5 marzo 1984[2]) è stato un attore statunitense. Indice 1 Biografia 2 Filmografia 3 Doppiatori italiani 4 Riconoscimenti 5 Galleria d'immagini 6 Note 7 Altri progetti 8 Collegamenti esterni Biografia William Powell nacque a Pittsburgh, in Pennsylvania, da una famiglia agiata. Contravvenendo all'ambizione paterna, che lo avrebbe voluto avvocato, decise di fare l'attore e, all'età di 18 anni...

 

Indigenous American Huitoto language Minica HuitotoMɨnɨkaNative toColombia, PerúNative speakers1,500 (2008)[1]Language familyBora–Witoto Witoto–OcainaWitotoMinica–MuruiMinica HuitotoLanguage codesISO 639-3htoGlottologmini1256ELPMinica Huitoto Minica (Mɨnɨka) Huitoto is one of three indigenous American Huitoto languages of the Witotoan family spoken by a few thousand speakers in western South America.[1] It is spoken in the Upper Igara-Paraná river area, a...

The possibility of a slave revolt in the mold of the Haitian one was a constant fear in the minds of the 19th century ruling elites of the Americas Not to be confused with Antihaitianism. Haitianism was a widespread fear period during the 19th-century history of America, especially in the United States, the Captaincy General of Cuba and the Empire of Brazil, of a black or slave insurrection, due to real or imagined events; real events included those such as the 1811 German Coast Uprising and ...

 

Effect pedal used manually with electric guitars to express a sweeping vocal quality This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Wah-wah pedal – news · newspapers · books · scholar · JSTOR (August 2020) (Learn how and when to remove this message) Thomas Organ Cry Baby (1970) manufactured by JEN Wah-wah p...

 

Questa voce sull'argomento atleti tedeschi è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Segui i suggerimenti del progetto di riferimento. Silke KnollNazionalità Germania Ovest Germania Altezza163 cm Peso52 kg Atletica leggera Specialità100 metri piani, 200 metri piani, 400 metri piani Termine carriera???? Palmarès  Germania Competizione Ori Argenti Bronzi Mondiali 0 0 1 Europei 1 0 0 Europei indoor 0 1 0 World Cup 0 1 0 Europei juniore...

Sporting event delegationPoland at the1928 Winter OlympicsIOC codePOLNOCPolish Olympic CommitteeWebsitewww.pkol.pl (in Polish)in St. MoritzCompetitors26 (men) in 5 sportsFlag bearerAndrzej Krzeptowski[1]Medals Gold 0 Silver 0 Bronze 0 Total 0 Winter Olympics appearances (overview)192419281932193619481952195619601964196819721976198019841988199219941998200220062010201420182022 Poland competed at the 1928 Winter Olympics in St. Moritz, Switzerland. Bobsleigh Main article: Bobsl...

 

У этого термина существуют и другие значения, см. Плесецк. Рабочий посёлокПлесецк 62°42′30″ с. ш. 40°17′48″ в. д.HGЯO Страна  Россия Субъект Федерации Архангельская область Муниципальный район Плесецкий Городское поселение Плесецкое История и география Основан 18...