Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special issue of selected papers of 17th Central EuropeanConference on Cryptology
Guest editors: Mieczysław Kula, Damian Niwiński and Jacek Pomykała
Article type: Research Article
Authors: Hanzlik, Lucjana | Kluczniak, Kamilb | Kutyłowski, Mirosławc; †
Affiliations: [a] Stanford University and CISPA Helmholtz Center for Information Security, 353 Serra Mall, Stanford, CA 94305, USA. lucjan.hanzlik@stanford.edu | [b] CISPA Helmholtz Center for Information Security, Stuhlsatzenhaus 5, Saarland Informatics Campus, 66123 Saarbrucken, Germany. kamil.kluczniak@cispa.saarland | [c] Wrocław University of Science and Technology, Department of Computer Science, Faculty of Fundamental Problems of Technology, Wybrzeże Wyspiańskiego 27, 50-370 Wrocław, Poland. miroslaw.kutylowski@pwr.edu.pl
Correspondence: [†] Address for correspondence: Wrocław University of Science and Technology, Faculty of Fundamental Problems of Technology, Wybrzeże Wyspiańskiego 27, 50-370 Wrocław, Poland
Note: [*] This research has been supported by Polish National Science Centre grant OPUS, no 2014/15/B/ST6/02837, and done when all authors have been affiliated with Wrocław University of Science and Technology
Abstract: Security of many cryptographic protocols is conditioned by the quality of the random elements generated in the course of the protocol execution. On the other hand, cryptographic devices implementing these protocols are designed given technical limitations, usability requirements and cost constraints. This frequently results in a black box solution. Unfortunately, black box random number generators may enable creating backdoors for stealing signing keys, breaking authentication protocols and encrypted communication. In this paper we deal with this problem and extend our approach proposed during MYCRYPT’2016. The solution discussed is generating random parameters so that: (a) the protocols are backwards compatible (a user gets additional data that can be simply ignored), (b) verification of randomness might be executed any time without notice, so a device is forced to behave honestly, (c) the solution makes almost no intrusion in the existing protocols and is easy to implement, (d) the owner of a cryptographic device becomes secured against its designer and manufacturer that may even predict the output of the generator. In this paper we focus on a case when Diffie-Hellman protocol is executed for a generator that itself is a secret – this case has not been solved in our paper from MYCRYPT’2016. On the other hand, exactly this case occurs for the PACE protocol from the ICAO standard specifying electronic travel documents. For the sake of the proof we develop a framework of nested security games that aims to enable security proofs of modified protocols without redoing the proofs designed for their original versions.
Keywords: cryptographic device, pseudorandom number generator, backdoor, provable security, security game, PACE, Diffie-Hellman key exchange
DOI: 10.3233/FI-2019-1849
Journal: Fundamenta Informaticae, vol. 169, no. 4, pp. 295-330, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl