Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols
Prikladnaya Diskretnaya Matematika. Supplement, no. 17 (2024), pp. 51-57.

Voir la notice de l'article provenant de la source Math-Net.Ru

We describe impersonation attacks on SIGMA, SIG-DH, and TS3-1 protocols with related keys. The attacks use an attack on the signature with related keys (for example, ECDSA). Attacks differ in adversary capabilities caused by the synthesis principles of protocols: the use of the initiator's identifier as part of the signed message and as part of the first message requires the adversary to have the capability to force an identifier upon registration; the use of the responder's public ephemeral key as part of the signed message requires the adversary to have the capability to compromise future public ephemeral keys.
Keywords: cryptography, cryptographic protocol, authenticated key establishment, related keys
Mots-clés : signature.
@article{PDMA_2024_17_a12,
     author = {E. K. Alekseev and S. N. Kyazhin},
     title = {Related-Key {Attacks} on {Signature-based} {Authenticated} {Key} {Establishment} {Protocols}},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {51--57},
     publisher = {mathdoc},
     number = {17},
     year = {2024},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/}
}
TY  - JOUR
AU  - E. K. Alekseev
AU  - S. N. Kyazhin
TI  - Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2024
SP  - 51
EP  - 57
IS  - 17
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/
LA  - ru
ID  - PDMA_2024_17_a12
ER  - 
%0 Journal Article
%A E. K. Alekseev
%A S. N. Kyazhin
%T Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2024
%P 51-57
%N 17
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/
%G ru
%F PDMA_2024_17_a12
E. K. Alekseev; S. N. Kyazhin. Related-Key Attacks on Signature-based Authenticated Key Establishment Protocols. Prikladnaya Diskretnaya Matematika. Supplement, no. 17 (2024), pp. 51-57. http://geodesic.mathdoc.fr/item/PDMA_2024_17_a12/

[1] Alekseev E. K., Babueva A. A., and Zazykina O. A., AKE Zoo: 100 Two-Party Protocols (to be continued), Cryptology ePrint Archive, Paper 2023/1044, 2023

[2] Alekseev E. K. and Kyazhin S. N., “Probing the security landscape for authenticated key establishment protocols”, 12th Workshop CTCrypt 2023, Pre-proceedings, 2023, 67–82

[3] Babueva A. A. and Kyazhin S. N., “Public keys for e-coins: partially solved problem using signature with rerandomizable keys”, Prikladnaya diskretnaya matematika. Prilozhenie, 2023, no. 16, 110–114

[4] Babueva A. A., Kyazhin S. N., “Additivno svyazannye klyuchi podpisi: vzlomat nelzya ispolzovat”, XXVI Nauchno-praktich. konf. «RusKripto'2014», 2024 https://www.ruscrypto.ru/resource/archive/rc2024/files/05_babueva_kyazhin.pdf | Zbl

[5] Morita H., Schuldt J. C. N., Matsuda T., et al., “On the security of the Schnorr signature scheme and DSA against related-key attacks”, LNCS, 9558, 2016, 20–35 | MR | Zbl

[6] Krawczyk H., “The “SIGn-and-MAc” approach to authenticated Diffie — Hellman and its use in the IKE protocols”, LNCS, 2729, 2003, 400–425 | MR | Zbl

[7] Jeong I. R., Katz J., Lee D. H., One-Round Protocols for Two-Party Authenticated Key Exchange, 2008 https://www.cs.umd.edu/ ̃ jkatz/papers/1round_AKE.pdf

[8] Canetti R., Krawczyk H., “Analysis of key-exchange protocols and their use for building secure channels”, LNCS, 2045, 2001, 453–474 | MR | Zbl