Download presentation
Presentation is loading. Please wait.
Published byFrancine White Modified over 9 years ago
1
多媒體網路安全實驗室 An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security Date:2012/02/16 報告人:向峻霈 出處 : He Debiao, Chen Jianhua and Hu Jin Information Fusion 2011
2
多媒體網路安全實驗室 Outline Introduction 1 Proposed scheme 2 Security analysis 33 Functionality comparison 44 Conclusion 35 2
3
多媒體網路安全實驗室 Introduction In electronic transactions, remote client authentication in insecure channel is an important issue ECC-based authentication protocols are more suitable for mobile devices 3
4
多媒體網路安全實驗室 Proposed scheme System initializing phase Client registration phase Mutual authentication with key agreement phase 4
5
多媒體網路安全實驗室 System initializing phase S generates parameter of the system Chooses a large prime number q(q>2 160 ) Fp :y 2 = x 3 +ax+b mod F p a,b ∈ F p 4a 3 +27b 2 mod q ≠ 0, G is a generator point of a large order n(n>2 160 ) H 1 :{0,1}* -> Z n * H 2 :{0,1}*-> Z p * H 3 :{0,1}* -> Z p * public parameters =>(F p,E,n,P,P s,H 1,H 2,H 3,MAC k (m) 5
6
多媒體網路安全實驗室 Client registration phase 6 ID C h Ci =H 1 (ID Ci ) D Ci =(1/x+h Ci )P ∈ G // private key P Ci =(h Ci + x)P =h Ci P + P S Client CServer S 1.off-line S stores the identity ID Ci DCi into a smart card and returns it to the client 2. on-line Ci connects to the server S through Internet S may use the SSL channel in the https mode to deliver the private key D Ci to the client C i
7
多媒體網路安全實驗室 Mutual authentication with key agreement phase 7 Client CServer S M 1 =(ID C,T C,M,MAC K (ID C,T S,M) Check ID C Check T C h C = H 1 (ID C ) M’ =(1/q s +h C )M k = H 2 (ID C,T C,M,M’) Check MAC K (ID C,T S,M) W = r S x P K S = r S x M sk = H 3 (ID C,T C,T S,M,W,K S ) M 2 =(ID C,T S,W,MAC K (ID C,T S,W) Check MAC k (ID C,T S,W) K C =r C x W sk = H 3 (ID C,T C,T S,M,W,K C ) M = r c x P M’ = r C x D C k = H 2 (ID c,T C,M,M’)
8
多媒體網路安全實驗室 Security analysis Discussion about Smart-Card-Stolen attack Known session key security Perfect forward secrecy No key-compromise impersonation No unknown key-share No key control 8
9
多媒體網路安全實驗室 Smart-Card-Stolen attack 9 server validity of users 3. New card 1.loss 2. request
10
多媒體網路安全實驗室 Known session key security if an adversary, having obtained some previous session keys cannot get the session keys of the current run of the key agreement protocol 10
11
多媒體網路安全實驗室 Perfect forward secrecy 11 Client CServer S M 1 =(ID C,T C,M,MAC K (ID C,T S,M) M 2 =(ID C,T S,W,MAC K (ID C,T S,W) Check MAC k (ID C,T S,W) K C =r C x W sk = H 3 (ID C,T C,T S,M,W,K C ) M = r c x P M’ = r C x D C k = H 2 (ID c,T C,M,M’) Check ID C Check T C h C = H 1 (ID C ) M’ =(1/q s +h C )M k = H 2 (ID C,T C,M,M’) Check MAC K (ID C,T S,M) W = r S x P K S = r S x M sk = H 3 (ID C,T C,T S,M,W,K S ) master key forward secrecy perfect forward secrecy The adversary has to solve the CDHA satisfying
12
多媒體網路安全實驗室 No key-compromise impersonation The compromise of one client’’s client’s static private key does not imply that the private keys of other client 12 ID C h Ci =H 1 (ID Ci ) D Ci =(1/x+h Ci )P ∈ G // private key P Ci =(h Ci + x)P =h Ci P + P S Client CServer S
13
多媒體網路安全實驗室 No unknown key-share If the adversary convinces a group of entities that they share some session key with the adversary the adversary is required to learn the private key of some entity 13
14
多媒體網路安全實驗室 No key control 14 Client CServer S M 1 =(ID C,T C,M,MAC K (ID C,T S,M) M 2 =(ID C,T S,W,MAC K (ID C,T S,W) Check MAC k (ID C,T S,W) K C =r C x W sk = H 3 (ID C,T C,T S,M,W,K C ) M = r c x P M’ = r C x D C k = H 2 (ID c,T C,M,M’) Check ID C Check T C h C = H 1 (ID C ) M’ =(1/q s +h C )M k = H 2 (ID C,T C,M,M’) Check MAC K (ID C,T S,M) W = r S x P K S = r S x M sk = H 3 (ID C,T C,T S,M,W,K S )
15
多媒體網路安全實驗室 Functionality comparison TG mul : time of executing a scalar multiplication operation of point TG mtph : time of executing a map-to-point hash function TG grp : time of generating a random point on the elliptic curve TG inv : time of executing a modular inversion operation. TG add : time of executing an addition operation of points TG h : time of executing a one-way hash function TG mac :time of executing a message authentication code 15
16
多媒體網路安全實驗室 Yang et al.’s schemeYoon et al.’s schemeOur protocol Computational cost (client) 4TG mul + TG mtph + TG grp + 2TG add + 3TG h 3TG mul + 2TG h + 2GT mac Execution time (client)63.77 ms 36.25 ms Computational cost (server) 4TG mul + TG mtph + TG grp + 2TG add + 3TG h 3TG mul + 3TG h + 2GT mac + TG inv Execution time (server)4.39 ms 2.63 ms Perfect forward secrecy No Yes Known attacksImpersonation attackUnknownProvably secure 16
17
多媒體網路安全實驗室 Conclusion The proposed protocol offers key agreement and mutual authentication We demonstrate the comparisons among our protocol The proposed protocol is well suited for mobile client server environment 17
18
多媒體網路安全實驗室
19
Security model 19 : non-negligible advantage t : steps and making at most q se : Send oracle q h : Hash oracle q en : Encrypt oracle q ex : Execute oracle queries
20
多媒體網路安全實驗室 Security model B then selects two random numbers r1&r2 r 1 &r 2 Z n T 1 =r 1 *G T 2 =r 2 *G PK s =C 2 20
21
多媒體網路安全實驗室 Security model Send(,M) Execute(, ) Hash(M) Encrypt(M1,M2, K) Decrypt(C, K) 21
22
多媒體網路安全實驗室 Security model 22
23
多媒體網路安全實驗室 Security model Send(,M), where M = “start” 23 K 1 = r 1 x PK s M 1 = E k 1 (U c ||N once1 ) msg-out = (T 1 ||M 1 ) internal-stat = (,r 1, N once1,msg-out ) SK( ) = FALSE Return(msg-out)
24
多媒體網路安全實驗室 Security model Send(,M), where M ≠ “start” 24 K 1 = {0,1} l 2 (U c ||N once1 )<- D k 1 (M 1 ) K 2 = r 2 x PK c K 3 = α ∈ Z n msg-out = (T 2 ||M 2 ) internal-stat = (,r2, N once2,msg-out ) SK( ) = H(k 3 ||N once1 ||N once2 ) M 2 = E k 2 (H(k 3 ||N once1 ), N once2 ) else->msg-out = ⊥
25
多媒體網路安全實驗室 Security model Send(,M), where M ≠ “start” 25 internal-stat i u = ( U s,r 1, N once1,msg-out 1 ) msg-out = (T 2 ||M 2 ) K 2 = {0,1} l 2 ( δ ||N once2 )<- D k 2 (M 2 ) if( δ==H(K 3 ||N once1 ) ) then {SK( ) = H(k 3 ||N once1 ||N once2 ); return ⊥ ;} else {return ⊥ ;}
26
多媒體網路安全實驗室 Security model Execute(, ) 26 A Execute queries
27
多媒體網路安全實驗室 Security model Hash(M) 27 A Hash queries 1. Previous result 2. Return r ->A Check M H-table B 2.1 record(M,r)
28
多媒體網路安全實驗室 Security model Encrypt(M1,M2, K) 28 A Encrypt queries 1. Return C 2. Return C(M 1 +M 2 ) and record E-table Check record(M 1,M 2,K,C) E-table B 2.1 record(M 1,M 2,K,C)
29
多媒體網路安全實驗室 Security model Decrypt(C, K) 29 A Decrypt queries 1. Return M 1,M 2 2. Return r 1,r 2 ->A record E-table Check record(M 1,M 2,K,C) E-table B 2.1 record(M 1,M 2,K,C) //r 1,r 2 Hash(), N once2
30
多媒體網路安全實驗室 Security proof of SEIKA(1/2) We divide the advantage of B into two simulations 30
31
多媒體網路安全實驗室 Security proof of SEIKA(1/2) α ->PKc ||PKs ->B wins the probability of encrypted key is broken, B -> encryption scheme is broken, B -> 31 A Execute queries B Find α
32
多媒體網路安全實驗室 Security proof of SEIKA(2/2) 32 M2M2 derive α Send 1 has been queried,B-> Depending, B ->,B-> Depending, B ->
33
多媒體網路安全實驗室 Security proof of SEIKA’ 33 M3M3 probability forged H(K 3 ||N once2 ) ≠ H(K 3 ||N once2 )
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.