Download presentation
Presentation is loading. Please wait.
Published byBritton O’Brien’ Modified over 9 years ago
1
Mutual Authentication and Key Exchange Protocol (MAKEP) Reporter: Jung-Wen Lo ( 駱榮問 ) Date: 2008/4/18
2
2 Outline Introduction ES-MAKEP: Efficient & Secure MAKEP Fuw-Yi Yang and Jinn-Ke Jan (2004) ES-MAKEP-Forward Secret Attack F-MAKEP He Yijun, Xu Nan and Li Jie (2007) Comment
3
3 Introduction MAKEP: Mutual authentication and key exchange protocol L-MAKEP: Linear MAKEP Author: D. S. Wong and A. H. Chan Title: Mutual authentication and key exchange for low power wireless communications Src: Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force, IEEE, Vol. 1, 2001, pp. 39-43 IL-MAKEP: Improved L-MAKEP Author: K. Shim Title: Cryptanalysis of mutual authentication and key exchange for low-power wireless communications Src: IEEE Communications Letters, Vol. 7, No. 5, pp.248-250, 2003. I-MAKEP Authors: Jinn-Ke Jan and Yi-Hwa Chen Title: A new efficient MAKEP for wireless communications Src: In Proceedings of the 18 th International Conference on Advanced Information Networking and Application (AINA’04), IEEE, Volume 2, pp. 347-350, 2004 ES-MAKEP: Efficient & Secure MAKEP Authors: Fuw-Yi Yang and Jinn-Ke Jan Title: A Secure and Efficient Key Exchange Protocol for Mobile Communications Src: Cryptology ePrint Archive 2004/167, July 2004, http://eprint.iacr.org F-MAKEP: Perfect forward secrecy Improved ES-MAKEP
4
A Secure and Efficient Key Exchange Protocol for Mobile Communications Authors: Fuw-Yi Yang and Jinn-Ke Jan Src: Cryptology ePrint Archive 2004/167, July 2004, http://eprint.iacr.org
5
5 Notation ε pk (): an asymmetric encryption function δ SK (): an asymmetric decryption function E K () : a symmetric encryption function D K (): a symmetric decryption function SK S : a private key of server S PK S : a public key of server S ID U : the identification of a client entity U ID S : the identification of a server S p, q: a private key pair of U g,n: a public key pair of U x || y: string x concatenates string y |n|: bit length of n r UK, r UF, r UR :three random numbers selected by U r SK : a random number selected by S r ∈ R G : r is a random number selected from the set G l: the length of session keys
6
6 ES-MAKEP User U Server S r UK,r UR,r UF C1 r UK =ε PK S (r UK ) CMT=g r UF ||r UF mod n M1={C1 r UK,CMT,ID U } r UK = δ SK S (C1 r UK ) Random r sk σ SU =r SK r UK C2 r UK =E σ SU (r UK ) M2={r SK,C2 r UK } σ US =r UK r SK r’ UK =D σ US (C2 r UK ) =D σ US (E σ SU (r UK )) r’ UK ?= r UK S F =h(r UK,r SK,ID U,ID S ) C3=E σ SU (ID U ) S R =2 |n| (r UF -S F )+r UR mod λ(n) ※ n=pq ;λ(n)=lcm(p-1, q-1) M3={C3,S R } S F =h(r UK,r SK,ID U,ID S ) CMT’=g S F ||S R mod n CMT’?=CMT (PK S,SK S )
7
A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications Authors: He Yijun, Xu Nan and Li Jie Src: The Second International Conference on Availability, Reliability and Security, 2007. ARES 2007, 10-13 April 2007 pp. 558 – 563
8
8 ES-MAKEP -Forward Secret Attack User U Server S r UK,r UR,r UF C1 r UK =ε PK S (r UK ) CMT=g r UF ||r UF mod n M1={C1 r UK,CMT,ID U } r UK = δ SK S (C1 r UK ) Random r sk σ SU =r SK r UK C2 r UK =E σ SU (r UK ) M2={r SK,C2 r UK } σ US =r UK r SK r’ UK =D σ US (C2 r UK ) =D σ US (E σ SU (r UK )) r’ UK ?= r UK S F =h(r UK,r SK,ID U,ID S ) C3=E σ SU (ID U ) S R =2 |n| (r UF -S F )+r UR mod λ(n) M3={C3,S R } S F =h(r UK,r SK,ID U,ID S ) CMT’=g S F ||S R mod n CMT’?=CMT Attacker Conceal SK S (PK S,SK S )
9
9 F-MAKEP User U Server S r UK,r UR,r UF C1 r UK =ε PK S (g r UK ) CMT=g r UF ||r UF mod n M1={C1 r UK,CMT,ID U } r UK = δ SK S (C1 r UK ) Random r sk σ SU =g r SK r UK C2 r UK =E σ SU (r UK ) M2={r SK,C2 r UK } σ SU =g r SK r UK r’ UK =D σ US (C2 r UK ) =D σ US (E σ SU (r UK )) r’ UK ?= r UK S F =h(r UK,r SK,ID U,ID S ) C3=E σ SU (ID U ) S R =2 |n| (r UF -S F )+r UR mod λ(n) ※ n=pq ;λ(n)=lcm(p-1, q-1) M3={C3,S R } S F =h(r UK,r SK,ID U,ID S ) CMT’=g S F ||S R mod n CMT’?=CMT (PK S,SK S )
10
10 Comment Conceal secret key is difficult ES-MAKEP & F-MAKEP: PKI system => Inefficient => Not suitable for wireless devices
11
11 DoS-Resistance Protocol Y ⊕ H(pw j ),σ ⊕ H(pw i ) Server A (pw1,pw2) Client B (pw1,pw2) 3. r A Y= r A ⊕ r B σ=H(r A,r B,ID A,ID B ) 2. Try pw i 5. H(σ’) ID A,ID B,X, H(ID A,ID B,X) 1. r B X=pw i ⊕ r B 4. r’ A =Y ⊕ r B σ’=H(r’ A,r B,ID A,ID B ) H(σ’) ?= H(σ) 4. H(σ’) ?= H(σ)
12
12 PK-based MAKEP
13
13 Server-specific MAKEP
14
14 Linear MAKEP
15
15 Unknown key-share attack on L- MAKEP(?) y’=cy σ’ =r A y’ E σ’ (x)
16
16 IL-MAKEP E σ (x,ID A,ID B )
17
A new efficient MAKEP for wireless communications Authors: Jinn-Ke Jan and Yi-Hwa Chen Src: In Proceedings of the 18th International Conference on Advanced Information Networking and Application (AINA’04), IEEE, Volume 2, pp. 347-350, 2004
18
18 I-MAKEP User U Server S ID,Y v = y e +ID mod N Random r s u,t,s Random w,k u=g w mod N t=E PK S (k) s=w+x H(rs||t||u) σ=k s H(k’) Register Phase x v=g -x mod N ID,v y=(v-ID) d mod N Session Key Generation Phase rsrs g s v H(r s ||t||u) ?≡u mod N k’=D(t) σ=k’ s H(k’)?=H(k)
19
19 ES-MAKEP Performance- Client’s Computations
20
20 Remark for Table 1
21
21 ES-MAKEP Performance- Server’s Computations
22
22 Remark for Table 2
23
23 ES-MAKEP Performance- Message Sizes
24
24 WTLS The security of WAP Operate over the transport layer Provide privacy, data integrity & authentication Two layer protocol Lower layer: Record protocol encrypt/decrypts data Upper layer protocol (4 sub-protocols) 1. Handshake Protocol Establish/resume the secure connection between WAP client and WAP gateway. 2. Alert Protocol Send urgent data or signals. 3. Change Cipher Protocol Exchange keys on the fly to guarantee the security dynamically. 4. Application Protocol Send data from application to Record Protocol and deliver the received data from Record Protocol to applications.
25
25 WTLS Handshake Notation V: version of WTLS SID: session ID SecNeg E : key exchange suit, cipher suit, key fresh, etc of entity E K P : pre_master_secret K m : master_secret h: one-way hush function f: a function to compute master_secret with KP Cert E : Certificate of E X E : private key of E P E : public key of E
26
26 WTLS based on F-MAKEP
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.