Security in the Presence of Key Reuse: Context-Separable Interfaces and Their Applications

被引:0
作者
Patton, Christopher [1 ]
Shrimpton, Thomas [1 ]
机构
[1] Univ Florida, Florida Inst Cybersecur Res, Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1 | 2019年 / 11692卷
关键词
Key reuse; APIs; Diffie-Hellman; EdDSA; Noise; ENCRYPTION;
D O I
10.1007/978-3-030-26948-7_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key separation is often difficult to enforce in practice. While key reuse can be catastrophic for security, we know of a number of cryptographic schemes for which it is provably safe. But existing formal models, such as the notions of joint security (Haber-Pinkas, CCS '01) and agility (Acar et al., EUROCRYPT '10), do not address the full range of key-reuse attacks-in particular, those that break the abstraction of the scheme, or exploit protocol interactions at a higher level of abstraction. This work attends to these vectors by focusing on two key elements: the game that codifies the scheme under attack, as well as its intended adversarial model; and the underlying interface that exposes secret key operations for use by the game. Our main security experiment considers the implications of using an interface (in practice, the API of a software library or a hardware platform such as TPM) to realize the scheme specified by the game when the interface is shared with other unspecified, insecure, or even malicious applications. After building up a definitional framework, we apply it to the analysis of two real-world schemes: the EdDSA signature algorithm and the Noise protocol framework. Both provide some degree of context separability, a design pattern for interfaces and their applications that aids in the deployment of secure protocols.
引用
收藏
页码:738 / 768
页数:31
相关论文
共 36 条
[1]  
Acar T., 2013, 2013667 CRYPT EPRINT
[2]  
Acar T, 2010, LECT NOTES COMPUT SC, V6110, P403
[3]   Comparing the Usability of Cryptographic APIs [J].
Acar, Yasemin ;
Backes, Michael ;
Fahl, Sascha ;
Garfinkel, Simson ;
Kim, Doowon ;
Mazurek, Michelle L. ;
Stransky, Christian .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :154-171
[4]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[5]  
[Anonymous], 2016, Tpm 2.0 library specification
[6]  
[Anonymous], 2018, 8446 RFC
[7]  
Barnes Richard, 2019, DELEGATED CREDENTIAL
[8]  
Bellare M, 2006, LECT NOTES COMPUT SC, V4004, P409
[9]   The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 [J].
Bellare, Mihir ;
Tackmann, Bjorn .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :247-276
[10]   High-speed high-security signatures [J].
Bernstein, Daniel J. ;
Duif, Niels ;
Lange, Tanja ;
Schwabe, Peter ;
Yang, Bo-Yin .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) :77-89