Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage

  • Authors:
  • Kazuki Yoneyama;Yunlei Zhao

  • Affiliations:
  • NTT Information Sharing Platform Laboratories, Tokyo, Japan;Software School, Fudan University, Shanghai, China

  • Venue:
  • ProvSec'11 Proceedings of the 5th international conference on Provable security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

SMQV authenticated key exchange scheme was stated to be secure against leakage of intermediate computations, i.e., secure in the seCK model. However, in this paper, we show errors in the security proof of SMQV. The found errors proceed from a failure in a simulation of leakage of intermediate computations. Moreover, we identify flaws in the security proofs of the underlying building tools of both SMQV and FHMQV, showing that both SMQV and FHMQV are not proven secure even in the traditional CK model. Then, we consider the cause of difficulty to prove security in the seCK model and classify previous Diffie-Hellman type authenticated key exchange schemes in the sense of achievable security levels. As a result, unfortunately, known schemes fall into hard to prove or insecure. Accordingly, we suggest that Diffie-Hellman type schemes provably secure in the seCK model are hard (or highly subtle) to achieve. Therefore, this paper clarifies the technical limitations (or high subtleties) of Diffie-Hellman type schemes for achieving provable security in the seCK model against leakage of intermediate computations.