Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation
In key assignment schemes for hierarchical access control systems, each access class has a key associated with it that can be used to derive the keys associated with every descendant of that class. Many recently proposed key assignment schemes support updates to the hierarchy such as addition and deletion of classes and class relationships. The dynamic changes entail a change to the hierarchy as well as re-computing of public and secret information. In this paper, we describe a software tool that supports the animation of specifications of dynamic schemes. The specification of a scheme, written in Prolog, corresponds to a symbolic model of the algorithms used by the scheme for key generation and for handling dynamic changes. The tool allows us to generate a test hierarchy, generate keys for the classes in the hierarchy, and simulate various dynamic operations. The animation search using the tool has shown to be useful in finding previously unreported attacks on several existing dynamic schemes.
KeywordsPublic Information Secret Information Dynamic Scheme Fair Exchange Protocol Dynamic Access Control
Unable to display preview. Download preview PDF.
- 7.Wu, T.-C., Chang, C.-C.: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1), 25–28 (2001)Google Scholar
- 9.Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 190–202. ACM (2005)Google Scholar
- 12.Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82–96. IEEE Computer Society (2001)Google Scholar
- 14.Tang, S.: Efficient key assignment for hierarchical access control using one-way hash function. In: Proceedings of the 10th WSEAS International Conference on Computers, ICCOMP 2006, Stevens Point, Wisconsin, USA, pp. 350–354 (2006)Google Scholar
- 16.He, Z.H., Li, Y.-S.: Dynamic key management in a user hierarchy. In: 2nd International Conference on Anti-counterfeiting, Security and Identification, ASID 2008, pp. 298–300 (August 2008)Google Scholar
- 17.Crampton, J., Martin, K.M., Wild, P.R.: On key assignment for hierarchical access control. In: CSFW, pp. 98–111. IEEE Computer Society (2006)Google Scholar