ebook img

Protocols For Authentication And Key Establishment PDF

542 Pages·2020·5.128 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Protocols For Authentication And Key Establishment

Information Security and Cryptography Colin Boyd Anish Mathuria Douglas Stebila Protocols for Authentication and Key Establishment Second Edition Information Security and Cryptography SeriesEditors DavidBasin KennyPaterson AdvisoryBoard MichaelBackes GillesBarthe RonaldCramer IvanDamgård AndrewD.Gordon JoshuaD.Guttman Christopher Kruegel UeliMaurer TatsuakiOkamoto Adrian Perrig BartPreneel Moreinformationaboutthisseriesathttp://www.springer.com/series/4752 Colin Boyd • Anish Mathuria • Douglas Stebila Protocols for Authentication and Key Establishment Second Edition Colin Boyd Anish Mathuria Department of Information Security Dhirubhai Ambani Institute and Communication Technology of Information and Communication Norwegian University of Science Technology (DA-IICT) and Technology Gandhinagar, Gujarat, India Trondheim, Norway Douglas Stebila Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada Originally published under: Boyd C. and Mathuria A. ISSN 1619-7100 ISSN 2197-845X (electronic) Information Security and Cryptography ISBN 978-3-662-58145-2 ISBN 978-3-662-58146-9 (eBook) https://doi.org/10.1007/978-3-662-58146-9 © Springer-Verlag GmbH Germany, part of Springer Nature 2003, 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer-Verlag GmbH, DE part of Springer Nature. The registered company address is: Heidelberger Platz 3, 14197 Berlin, Germany Tothememoryofmyfather Thouthyworldlytaskhastdone –CB Tothememoryofmygrandmother –AM Tomyparentsandteachers –DS Preface Thefirsteditionofthisbookwaspublishedin2003.Inevitably,certainpartsofthe book became outdated quickly. At the same time new developments have contin- uedapace,includingnewconcreteprotocols,newunderstandingofprotocolsecurity properties, and new cryptographic primitives and techniques which can be used in protocol design. Work on a new edition began as early as 2010, but even as it was beingwrittenitsscopeexpanded.Weareawarethatsomeimportantprotocolshave beenomitted,andthatthereareemergingareaswhichwillseeconsiderableactivity inthenearfuture(post-quantumsecureprotocolsbeingoneobviousexample).How- ever,westillhopethatwehavebeenabletocapturemostofthemaindevelopments thathaveoccurredsincethefirstedition. Thissecondeditionhasbroadlythesamepurposeandscopeasthefirstedition. We hope to provide a helpful reference for the expert while still being accessible to those newer to the topic, including those trying to obtain a broad overview of the field. In comparison with the first edition, there are three new chapters and all the other chapters (one renamed) have been extensively revised. The new book is around50%largerwitharound225concreteprotocolsdescribedandabibliography withalmosttwiceasmanyreferences.Someoldermaterial,whichwedeemedless relevanttoday,hasbeenremoved. Chapter1 replaces the first two chapters from the first edition. The chapter is in- tended to provide the necessary background on cryptography, attack scenarios andprotocolgoalswithanexpandedcoverage.Theinitialtutorialintroduction hasbeenmovedtoanappendix,whilesomepartsofChapter2fromthefirstedi- tionwereremovedastheyseemednolongerrelevant.Anupdated,butsomewhat shortened,introductiontoprotocolverificationisalsoincluded. Chapter2 isthefirstcompletelynewchapter,describingcomputationalmodelsfor key exchange and authentication. The purpose of this chapter is not to provide a tutorial on how to read, let alone write, computational proofs, but rather to trytohelpreadersunderstandwhatacomputationalproofprovidesandhowto compare the many different computational models in use. In later chapters we VII VIII Preface havefreelymadereferencetothemajorcomputationalmodelswhendiscussing specificprotocolsandtheirsecurity. Chapter3 isanupdatedchaptercoveringprotocolsusingsharedkeycryptography. ThisincludesmajorupdatesonthestatusoftheprotocolsintheISO9798-2and 11770-2standards. Chapter4 isanupdatedchapteronprotocolsusingpublickeycryptography.Again, thisincludesnewdevelopmentsoftheISOstandardprotocols,thistimeforthe 9798-3 and 11770-3 protocols. Coverage of TLS is moved to the new Chap. 6 whichisdevotedtoTLS. Chapter5 onkeyagreementis,asinthefirstedition,thelongestchapter.Thereis anamazingdiversityofideasindesignofkeyagreementprotocols,eveninthe simplestcasecoveredinthischapter,whichislimitedtotwo-partyprotocolsin the public key setting. Even though several older protocols from the first edi- tionhavebeenomitted,therevisedchapterisnowmorethantenpageslonger, illustratingthattherearestillmanynewdevelopmentsoccurring. Chapter6 isacompletelynewchapterontheTLSprotocol.Asthemostprominent keyestablishmentprotocolinusetoday,webelieveitismorethanjustifiableto devoteachaptertoTLS.Thedevelopmentoftheprotocolinthepast10years, culminating in the new TLS 1.3 protocol, provides many lessons for those re- searchingandimplementingkeyestablishmentprotocols. Chapter7 is the third new chapter and is dedicated to ID-based protocols. While itgathersinsomeearlyID-basedprotocolsalreadyincludedinthefirstedition, the coverage of pairing-based protocols forms the bulk of the chapter and is completelynew. Chapter8 isanupdatedchapteronpassword-basedprotocols.Thisisanothertopic wheretherehasbeenagreatdealofresearchactivitysincethefirsteditionlead- ingtoasignificantexpansioninthechapter. Chapter9 is an updated (and renamed) chapter on group key establishment. Al- thoughgroupprotocolshavealonghistorytherehasbeenmuchrecentworkto modernisethetopicwithstrongersecuritypropertiesandformalproofs. AppendixA covers standards for key establishment and authentication protocols fromvariousstandardsbodies,updatedandexpandedfromthefirstedition. AppendixB consists of a tutorial introduction to protocols for authentication and keyestablishment.Thisisunchangedfromthecorrespondingsectioninthefirst edition,apartfromsomesmallnotationalrevisions. Acknowledgements Many people have given their help and advice generously to help us to improve the quality of the book. Different people have reviewed and provided comment on various portions of the book. We thank them all for their generous spirit and are sincerelysorryifwehavemisinterpretedorforgottenanyoftheirhelpfuladvice.This listincludesallthosewhowecanremember;wehopenottohavemissedanyone. Preface IX CraigCostello SigurdEskeland Ha˚konJacobsen TiborJager ChrisMitchell RuxandraOlimid KennethRadke SeongHanShin BerkantUstaoglu In addition, Kazuki Yoneyama provided helpful answers to specific questions. We are solely responsible for all errors of fact, presentation style, or just plain typing errorsthatthisbookmayhave. TheteamatSpringerhavebeenencouragingandhelpfulthroughout.Wewould particularlyliketothankRonanNugentforhisunfailingconfidenceandquickaction on all matters, even as we delayed time and again. Series editor Kenny Paterson providedenthusiasticandencouragingsupport. CB would like to record his personal thanks to his family for bearing with de- nialofserviceduringtheseeminglyinterminablesagaofthesecondedition.When theworkstartedhewaswithQueenslandUniversityofTechnology,particularlythe SchoolofElectricalEngineeringandComputerScience.Morerecentlyhehasbeen attheNorwegianUniversityofScienceandTechnologyinthedepartmentnowcalled Information Security and Communication Technology. Both institutions have pro- videdencouragementandresourcestosupportthiswork. AM would like to express his gratitude to his wife, Hemal, and daughter, Rad- hika, for their unfailing love, support, and patience. His work was carried out at the University of Massachusetts at Dartmouth and more recently at the Dhirubhai AmbaniInstituteofInformationandCommunicationTechnology.Hewouldliketo thankhiscolleaguesatbothoftheseinstitutionsfortheirsupportandencouragement. DS would like to thank CB and AM for inviting him to join them in updating the fine work they did in the first edition. This work has been carried out over his timeattheQueenslandUniversityofTechnology,McMasterUniversity,andnowthe UniversityofWaterloo,andcolleaguesatalloftheseweresupportiveofhisworkon thisproject. ThisbookwastypesetinLATEXonvariousplatforms.Thestylefortheprotocols andattacksisadaptedfromAnselmLingnau’sfloatpackage. Trondheim,Gandhinagar,Waterloo ColinBoyd January2019 AnishMathuria DouglasStebila Contents ListofProtocols .......................................................XXI ListofAttacks .......................................................XXVII 1 IntroductiontoAuthenticationandKeyEstablishment ............. 1 1.1 Introduction ............................................... 1 1.2 ProtocolArchitectures ...................................... 2 1.2.1 CryptographicKeys .................................. 2 1.2.2 MethodofSessionKeyGeneration ..................... 3 1.2.3 NumberofParties.................................... 4 1.2.4 Example............................................ 4 1.3 CryptographicTools ........................................ 5 1.3.1 Confidentiality ...................................... 6 1.3.2 DataOriginAuthenticationandDataIntegrity ............ 8 1.3.3 AuthenticatedEncryption ............................. 9 1.3.4 Non-repudiation ..................................... 9 1.3.5 ExamplesofCryptographicAlgorithms ................. 10 1.3.6 SecretSharing....................................... 11 1.3.7 FreshnessMechanisms ............................... 12 1.4 AdversaryCapabilities ...................................... 14 1.4.1 Eavesdropping ...................................... 15 1.4.2 Modification ........................................ 15 1.4.3 Replay ............................................. 16 1.4.4 Preplay............................................. 16 1.4.5 Reflection .......................................... 16 1.4.6 DenialofService .................................... 17 1.4.7 TypingAttacks ...................................... 18 1.4.8 Cryptanalysis ....................................... 20 1.4.9 CertificateManipulation .............................. 20 1.4.10 ProtocolInteraction .................................. 22 1.5 GoalsforAuthenticationandKeyEstablishment ................ 22 1.5.1 ModelsofSecurity................................... 24 XI XII Contents 1.5.2 KeyEstablishmentorAuthentication?................... 24 1.5.3 EntityAuthentication................................. 26 1.5.4 KeyEstablishment ................................... 28 1.5.5 KeyConfirmation.................................... 29 1.5.6 Example:STSProtocol ............................... 31 1.5.7 ForwardSecrecy..................................... 33 1.5.8 WeakForwardSecrecy ............................... 35 1.5.9 KeyCompromiseImpersonation ....................... 36 1.5.10 Deniability.......................................... 37 1.5.11 Anonymity ......................................... 39 1.5.12 ProtocolEfficiency................................... 41 1.6 ToolsforVerificationofProtocols............................. 43 1.6.1 FDR ............................................... 44 1.6.2 NRLAnalyzerandMaude-NPA........................ 47 1.6.3 ProVerif............................................ 48 1.6.4 ScytherandTamarin ................................. 48 1.6.5 ToolsforComputationalModels ....................... 50 1.6.6 ComparisonofTools ................................. 51 1.7 Conclusion................................................ 52 2 ComputationalSecurityModels ................................. 53 2.1 Introduction ............................................... 53 2.1.1 TheSignificanceofaComputationalProofofSecurity..... 54 2.1.2 ElementsofComputationalModels..................... 55 2.2 Bellare–RogawayModel .................................... 58 2.2.1 BR93:TheFirstComputationalModel .................. 58 2.2.2 BR95:Server-BasedProtocols ......................... 65 2.2.3 ThePublicKeySetting:TheBWMandBWJMModels .... 66 2.2.4 BPR00:ForwardSecrecyandPasswords ................ 67 2.2.5 SummarisingtheBRModelVariants.................... 69 2.3 Canetti–KrawczykModel.................................... 69 2.3.1 BCK98Model....................................... 69 2.3.2 CK01Model ........................................ 70 2.3.3 HMQVModel....................................... 75 2.4 eCKModel................................................ 76 2.4.1 MU08Model ....................................... 78 2.4.2 eCK-PFSModel..................................... 78 2.4.3 seCKModel ........................................ 79 2.5 ComparingComputationalModelsforKeyExchange ............ 79 2.5.1 ComparingtheBRandCKModels ..................... 80 2.5.2 ComparingeCKandOtherModels ..................... 81 2.5.3 SessionsandSessionIdentifiers ........................ 82 2.5.4 IncorporatingPublicKeyInfrastructure.................. 83 2.6 Shoup’sSimulationModel................................... 84 2.7 ModelsforEnhancedScenarios............................... 85

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.