Skip to main content

A Secure Encapsulation Schemes Based on Key Recovery System

  • Conference paper
  • First Online:
Book cover Silicon Valley Cybersecurity Conference (SVCC 2020)

Abstract

Network users apply encryption to send and receive data securely. Since ciphertext can be encrypted and decrypted only by lawful users, third parties do not have the ability to know the content of an encrypted message. However, a secret key is uesed for encryption, and if the secret key is lost or corrupted, there is a problem that the encrypted text cannot be decrypted. Additionally, malicious use of this encryption will cause problems. If encryption is used maliciously, the government cannot prevent criminal activity. Because of this law enforcement agencies need support for lawful interception to decrypt criminals or suspect’s ciphertexts. We need a key recovery system that can safely recover these secret keys or decrypt messages for lawful interception. There are two types of key recovery systems, a key escrow method and a key encapsulation method. This paper proposes secure schemes using key encapsulation. The key encapsulation method requires the key information used in the ciphertext, and the key information can be obtained from the KRF (Key Recovery Field). The obtained key can be used to decrypt the ciphertext. however, various security threats exist in key recovery system. Such as forgery and alteration of KRF, single point of failure, inability to recover keys, and collusion attacks. To solve these problems, we propose secure encapsulation schemes based on key recovery system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. NIST: Escrowed Encryption Standard. Federal Information Processing Standards Publication (1994)

    Google Scholar 

  2. Denning, D.E., Branstad, D.K.: A taxonomy for key recovery encryption systems (1997)

    Google Scholar 

  3. Kanyamee, K., Chanboon, S.: High-availability decentralized cryptographic multi-agent key recovery. Int. Arab J. Inf. Technol. 11(1), 52–58 (2014)

    Google Scholar 

  4. Lim, S., Kang, S., Sohn, J.: Modeling of multiple agent based cryptographic key recovery protocol. In: 19th Annual Computer Security Applications Conference, Proceedings. IEEE (2003)

    Google Scholar 

  5. Han, K., Yeun, C.Y., Kim, K.: New key escrow model for the lawful interception in 3GPP. In: 2009 Digest of Technical Papers International Conference on Consumer Electronics (2009)

    Google Scholar 

  6. Gennaro, R., et al.: Two-phase cryptographic key recovery system. Patent no. 5 (1999)

    Google Scholar 

  7. Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) \(\ll \) cost(signature) + cost(encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052234

    Chapter  Google Scholar 

  8. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

Download references

Acknowledgment

This research was supported by the MSIT (Ministry of Science, ICT), Korea, under the High-Potential Individuals Global Training Program) (2020-0-01596) supervised by the IITP (Institute for Information & Communications Technology Planning & Evaluation) and was supported by the Soonchunhyang University Research Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Im-Yeong Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, TH., Kim, WB., Seo, D., Lee, IY. (2021). A Secure Encapsulation Schemes Based on Key Recovery System. In: Park, Y., Jadav, D., Austin, T. (eds) Silicon Valley Cybersecurity Conference. SVCC 2020. Communications in Computer and Information Science, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-72725-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72725-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72724-6

  • Online ISBN: 978-3-030-72725-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics