On post-handshake authentication and external PSKs in TLS 1.3

被引:0
|
作者
Akhmetzyanova, Liliya [1 ]
Alekseev, Evgeny [1 ]
Smyshlyaeva, Ekaterina [1 ]
Sokolov, Alexandr [1 ]
机构
[1] CryptoPro LLC, Moscow, Russia
关键词
TLS; 1; 3 impersonation attack; Reflection attack; Post-handshake authentication; Pre-shared key; Security models;
D O I
10.1007/s11416-020-00352-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The TLS protocol is the main cryptographic protocol of the Internet. The work on its current version, TLS 1.3, was completed in 2018. This version differs significantly from the previous ones and has a clean-state design taking into account all modern principles of constructing secure cryptographic protocols. At the same time, even when there are security proofs in some fairly strong security model, it is important to explore the possibility of extending this model and then clarifying the security limits of the protocol. This work considers the restriction on the usage of post-handshake authentication in connections established with external PSK. We show that some vulnerability appears in the case of psk_ke mode (PSK-only key establishment) if more than one pair of entities can possess the same PSK. We provide several practical scenarios where this condition can be easily achieved. Also we propose appropriate mitigation to prevent this vulnerability.
引用
收藏
页码:269 / 274
页数:6
相关论文
共 3 条
  • [1] On post-handshake authentication and external PSKs in TLS 1.3
    Liliya Akhmetzyanova
    Evgeny Alekseev
    Ekaterina Smyshlyaeva
    Alexandr Sokolov
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 269 - 274
  • [2] CPA-Secure KEMs are also Sufficient for Post-quantum TLS 1.3
    Zhou, Biming
    Jiang, Haodong
    Zhao, Yunlei
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT III, 2025, 15486 : 433 - 464
  • [3] Faster Post-quantum TLS 1.3 Based on ML-KEM: Implementation and Assessment
    Zheng, Jieyu
    Zhu, Haoliang
    Dong, Yifan
    Song, Zhenyu
    Zhang, Zhenhao
    Yang, Yafang
    Zhao, Yunlei
    COMPUTER SECURITY-ESORICS 2024, PT II, 2024, 14983 : 123 - 143