Skip to main content

Entity authentication and authenticated key transport protocols employing asymmetric techniques

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1361))

Abstract

This paper investigates security proofs for protocols that employ asymmetric (public-key techniques to solve two problems: entity authentication and authenticated key transport.

A formal model is provided, and a definition of the goals within this model is supplied. Two protocols are presented and proven secure within this framework, given the existence of certain cryptographic primitives. The practical implementation of these protocols is discussed. We emphasize the relevance of these theoretical results to the security of systems used in practice. In particular, our results imply the security of some protocols standardized by ISO [15, 16] and NIST [20] in the model proposed.

This work is heavily influenced by the work of Bellare and Rogaway [1, 5], who demonstrate proven secure protocols for these problems using symmetric cryptosystems. Our paper is an extension of their work to the public-key setting.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology: Crypto '93, pages 232–249, 1993.

    Google Scholar 

  2. M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, pages 62–73, 1993.

    Google Scholar 

  3. M. Bellare and P. Rogaway. Entity authentication and key distribution. Full version of [1], available at http://www-cse.ucsd.edu/users/mihir.

    Google Scholar 

  4. M. Bellare and P. Rogaway. Optimal asymmetric encryption. In Advances in Cryptology: Eurocrypt '94, pages 92–111, 1995.

    Google Scholar 

  5. M. Bellare and P. Rogaway. Provably secure session key distribution-the three party case. In Proceedings of the 27th ACM Symposium on the Theory of Computing, pages 57–66, 1995.

    Google Scholar 

  6. M. Bellare and P. Rogaway. The exact security of digital signatures-how to sign with RSA and Rabin. In Advances in Cryptology: Eurocrypt '96, pages 399–416, 1996.

    Google Scholar 

  7. M. Bellare and P. Rogaway. Minimizing the use of random oracles in authenticated encryption schemes. In Proceedings of PKS'97, 1997.

    Google Scholar 

  8. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic design of two-party authentication protocols. In Advances in Cryptology: Crypto '91, pages 44–61, 1991.

    Google Scholar 

  9. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. DEC SRC report 39, Digital Equipment Corporation, Palo Alto, CA, Feb. 1989. Revised Feb. 1990.

    Google Scholar 

  10. W. Diffie and M. Hellman. New directions in Cryptography. IEEE Transactions on Information Theory, IT-22(6): 644–654, November 1976.

    Article  Google Scholar 

  11. W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2: 107–125, 1992.

    Google Scholar 

  12. C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications. In Advances in Cryptology: Crypto '94, pages 234–246, 1994.

    Google Scholar 

  13. S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28: 270–299, 1984.

    Article  Google Scholar 

  14. S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen message attacks. SIAM Journal of Computing, 17(2): 281–308, 1988.

    Article  Google Scholar 

  15. ISO/IEC 9798-3. Information technology-Security techniques-Entity authentication mechanisms-Part 3: Entity authentication using a public-key algorithm, International Organization for Standardization, Geneva, Switzerland, 1993 (first edition).

    Google Scholar 

  16. ISO/IEC 11770-3. Information technology-Security techniques-Key management — Part 3: Mechanisms using asymmetric techniques, draft, (DIS), 1996.

    Google Scholar 

  17. A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography, chapter 12. CRC Press, 1996.

    Google Scholar 

  18. R.C. Merkle. Secure communications over insecure channels. Communications of the ACM, 21: 294–299, 1978.

    Article  Google Scholar 

  19. J.H. Moore. Protocol failure in cryptosystems. Chapter 11 in Contemporary Cryptology: the Science of Information Integrity, G. J. Simmons, editor, 541–558, IEEE Press, 1992.

    Google Scholar 

  20. National Institute of Standards and Technology, Entity Authentication using Public Key Cryptography, FIPS 196, February, 1997.

    Google Scholar 

  21. D. Pointcheval and J. Stern. Security proofs for signature schemes. In Advances in Cryptology: Eurocrypt '96, pages 387–398, 1996.

    Google Scholar 

  22. C. Rackoff and D.R. Simon. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Advances in Cryptology: Crypto '91, pages 433–444, 1992.

    Google Scholar 

  23. Y. Zheng and J. Seberry. Immunizing public key cryptosystems against chosen ciphertext attacks. IEEE Journal on Selected Areas in Communications, 11(5): 715–724, 1993.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bruce Christianson Bruno Crispo Mark Lomas Michael Roe

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blake-Wilson, S., Menezes, A. (1998). Entity authentication and authenticated key transport protocols employing asymmetric techniques. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds) Security Protocols. Security Protocols 1997. Lecture Notes in Computer Science, vol 1361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0028166

Download citation

  • DOI: https://doi.org/10.1007/BFb0028166

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64040-0

  • Online ISBN: 978-3-540-69688-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics