Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols

  • M. Choudary Gorantla
  • Colin Boyd
  • Juan Manuel González Nieto
Conference paper

DOI: 10.1007/978-3-642-00468-1_7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5443)
Cite this paper as:
Gorantla M.C., Boyd C., González Nieto J.M. (2009) Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. In: Jarecki S., Tsudik G. (eds) Public Key Cryptography – PKC 2009. PKC 2009. Lecture Notes in Computer Science, vol 5443. Springer, Berlin, Heidelberg

Abstract

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

Keywords

Group Key Exchange Key Compromise Impersonation Insider Attacks 

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • M. Choudary Gorantla
    • 1
  • Colin Boyd
    • 1
  • Juan Manuel González Nieto
    • 1
  1. 1.Information Security Institute, Faculty of ITQueensland University of TechnologyBrisbaneAustralia

Personalised recommendations