Proceedings of the 1st ACM Conference on Computer and Communications Security - CCS '93 1993
DOI: 10.1145/168588.168594
|View full text |Cite
|
Sign up to set email alerts
|

On simple and secure key distribution

Abstract: Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secure distribution of secret keys, no provably secure key distribution protocols have yet been demonstrated. In this paper, we use an existing secure two-party authentication protocol as a stepping stone for constructing a series of simple and secure key distribution protocols. The protocols are shown to satisfy desired s e curity requir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

1994
1994
2010
2010

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Note that the correct value is suggested by all the right pairs, and hence it gets at least four suggestions with probability about 0.57. On the other hand, the probability that a wrong subkey is suggested at least four times is approximately 2 13 4 ·2 −64 = (2/3)·2 −16 . Hence, less than one subkey suggestion remains on average (If no subkey suggestions remain, which happens frequently, the set is discarded).…”
Section: A Detailed Description Of the 9-round Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that the correct value is suggested by all the right pairs, and hence it gets at least four suggestions with probability about 0.57. On the other hand, the probability that a wrong subkey is suggested at least four times is approximately 2 13 4 ·2 −64 = (2/3)·2 −16 . Hence, less than one subkey suggestion remains on average (If no subkey suggestions remain, which happens frequently, the set is discarded).…”
Section: A Detailed Description Of the 9-round Attackmentioning
confidence: 99%
“…The simpler the relation is, the easier it is for an adversary to manipulate the key in the desired fashion. For example, the key exchange protocol 2PKDP [13], allows an adversary to XOR the unknown key with a constant. Other related key attacks, such as those presented in [8,12], discuss practical attacks on well known schemes under different key relations.…”
Section: Related-key Attacksmentioning
confidence: 99%
“…The ticket expressions are similar to those used in the KryptoKnight Authentication and Key Distribution Service [8]. (See also [6,7,5]. )…”
Section: Protocol Descriptionmentioning
confidence: 99%
“…This approach might seem unrealistic, as it assumes that the attacker can control some relations between the unknown keys. Still, there are some instances, e.g., the 2PKDP protocol [43], where this approach suggests practical attacks.…”
Section: Introductionmentioning
confidence: 99%